Invariant Subspace Attack Against Full Midori64
@article{Guo2015InvariantSA, title={Invariant Subspace Attack Against Full Midori64}, author={Jian Guo and J. Jean and I. Nikolic and Kexin Qiao and Y. Sasaki and Siang Meng Sim}, journal={IACR Cryptol. ePrint Arch.}, year={2015}, volume={2015}, pages={1189} }
In this paper, we present an invariant subspace attack against block cipher Midori64 which has recently been proposed by Banik et al. at Asiacrypt 2015 to achieve low energy consumption. We show that when each nibble of the key has the value 0 or 1 and each nibble of the plaintext has the value 8 or 9, each nibble of the ciphertext also has the value 8 or 9 with probability one regardless of the number of rounds applied. This fact indicates that Midori64 has a class of 2 32 weak keys that can… CONTINUE READING
20 Citations
Truncated and Multiple Differential Cryptanalysis of Reduced Round Midori128
- Computer Science
- ISC
- 2016
- 4
- Highly Influenced
- PDF
Meet-in-the-Middle Attacks on Reduced-Round Midori64
- Computer Science, Mathematics
- IACR Trans. Symmetric Cryptol.
- 2017
- 19
- PDF
Cryptanalysis of Reduced-Round Midori64 Block Cipher
- Computer Science
- IACR Cryptol. ePrint Arch.
- 2016
- 8
- PDF
Nonlinear Invariant Attack - Practical Attack on Full SCREAM, iSCREAM, and Midori64
- Computer Science
- ASIACRYPT
- 2016
- 32
- PDF
Subspace Trail Cryptanalysis and its Applications to AES
- Computer Science, Mathematics
- IACR Trans. Symmetric Cryptol.
- 2016
- 59
- PDF
Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher
- Computer Science
- 2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC)
- 2017
- 3
- Highly Influenced
The QARMA Block Cipher Family. Almost MDS Matrices Over Rings With Zero Divisors, Nearly Symmetric Even-Mansour Constructions With Non-Involutory Central Rounds, and Search Heuristics for Low-Latency S-Boxes
- Mathematics, Computer Science
- IACR Trans. Symmetric Cryptol.
- 2016
- 73
- PDF
References
SHOWING 1-8 OF 8 REFERENCES
Meet-in-the-Middle Attacks on Reduced-Round Midori64
- Computer Science, Mathematics
- IACR Trans. Symmetric Cryptol.
- 2017
- 19
- PDF
A Cryptanalysis of PRINTcipher: The Invariant Subspace Attack
- Mathematics, Computer Science
- CRYPTO
- 2011
- 117
- PDF
A Generic Approach to Invariant Subspace Attacks: Cryptanalysis of Robin, iSCREAM and Zorro
- Mathematics, Computer Science
- EUROCRYPT
- 2015
- 50
- PDF
Tweaks and Keys for Block Ciphers: The TWEAKEY Framework
- Mathematics, Computer Science
- ASIACRYPT
- 2014
- 163
- PDF
PRINCE - A Low-Latency Block Cipher for Pervasive Computing Applications - Extended Abstract
- Computer Science
- ASIACRYPT
- 2012
- 388
- PDF