Related-Key Cryptanalysis of Midori - Université Clermont Auvergne Accéder directement au contenu
Communication Dans Un Congrès Année : 2016

Related-Key Cryptanalysis of Midori

Résumé

Midori64 and Midori128 [2] are lightweight block ciphers, which respectively cipher 64-bit and 128-bit blocks. While several attack models are discussed by the authors of Midori, the authors made no claims concerning the security of Midori against related-key differential attacks. In this attack model, the attacker uses related-key differential characteristics, i.e., tuples (δP , δK , δC) such that a difference (generally computed as a XOR) of δP in the plaintext coupled with a difference δK in the key yields a difference δC after r rounds with a good probability. In this paper, we propose a constraint programming model to automate the search for optimal (in terms of probability) related-key differential characteristics on Midori. Using it, we build related-key distinguishers on the full-round Midori64 and Midori128, and mount key recovery attacks on both versions of the cipher with practical time complexity, respectively 2 35.8 and 2 43.7 .
Fichier principal
Vignette du fichier
INDOCRYPT.pdf (393.87 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-01588566 , version 1 (15-09-2017)

Identifiants

  • HAL Id : hal-01588566 , version 1

Citer

David Gerault, Pascal Lafourcade. Related-Key Cryptanalysis of Midori. International Conference on Cryptology in India, Dec 2016, Kolkata, India. ⟨hal-01588566⟩
137 Consultations
333 Téléchargements

Partager

Gmail Facebook X LinkedIn More