Technology of Information Security
|
230-234,238

Meet-in-the-middle attacks on 10-round Midori 128

Liu Ya1a,1b,2
Diao Qianqian1a,3
Li Wei4,5
Liu Zhiqiang2
1. a. School of Optical-Electrical & Computer Engineering, b. Engineering Research Center of Optical Instrument & System for Ministry of Education, Shanghai Key Lab of Modern Optical System, University of Shanghai for Science & Technology, Shanghai 200093, China
2. Dept. of Computer Science & Engineering, Shanghai Jiao Tong University, Shanghai 200240, China
3. Shanghai Viewsource Information Science & Technology Co, Ltd, Shanghai 200240, China
4. School of Computer Science & Technology, Donghua University, Shanghai 201620, China
5. Shanghai Key Laboratory of Integrate Administration Security, Shanghai 200240, China

Abstract

The lightweight block ciphers could be widely used in various applications, such as smart cities, internet of things and cloud computation and so on, in order to protect data and information secure. Midori was a lightweight block cipher proposed in ASIACRYPT 2015. Its block size had two scenarios, i. e, 64 bit and 128 bit, denoted by Midori 64 and Midori 128 respectively. Up to now, there were no results about meet-in-the-middle attacks on Midori 128. This paper developed a meet-in-the-middle attack on 10-round Midori 128 for the first time. Specifically, studying the basic construction and key schedule of Midori 128, this paper constructed a 7-round distinguisher on Midori 128 by using the differential enumeration and key-dependent sieve techniques. Through appending one round at its top and two rounds at its bottom, this paper mounted a meet-in-the-middle attack on 10-round Midori 128. In the attack, time-memory tradeoff technique and some weak subkeys were considered so as to reduce the time complexity of online phase. Finally, the data, time and memory complexities of our attack are 2125 chosen plaintexts, 2126.5 10-round encryptions and 2105 128-bit blocks, respectively.

Foundation Support

国家自然科学基金资助项目(61402288,61772129,61672347)
“十三五”密码发展基金理论课题(MMJJ20180202)
信息保障技术重点实验室开放基金(KJ-17-008)
闵行区产学研合作计划项目(2016MH310)

Publish Information

DOI: 10.19734/j.issn.1001-3695.2017.07.0701
Publish at: Application Research of Computers Printed Article, Vol. 36, 2019 No. 1
Section: Technology of Information Security
Pages: 230-234,238
Serial Number: 1001-3695(2019)01-053-0230-05

Publish History

[2019-01-05] Printed Article

Cite This Article

刘亚, 刁倩倩, 李玮, 等. 10轮Midori 128的中间相遇攻击 [J]. 计算机应用研究, 2019, 36 (1): 230-234,238. (Liu Ya, Diao Qianqian, Li Wei, et al. Meet-in-the-middle attacks on 10-round Midori 128 [J]. Application Research of Computers, 2019, 36 (1): 230-234,238. )

About the Journal

  • Application Research of Computers Monthly Journal
  • Journal ID ISSN 1001-3695
    CN  51-1196/TP

Application Research of Computers, founded in 1984, is an academic journal of computing technology sponsored by Sichuan Institute of Computer Sciences under the Science and Technology Department of Sichuan Province.

Aiming at the urgently needed cutting-edge technology in this discipline, Application Research of Computers reflects the mainstream technology, hot technology and the latest development trend of computer application research at home and abroad in a timely manner. The main contents of the journal include high-level academic papers in this discipline, the latest scientific research results and major application results. The contents of the columns involve new theories of computer discipline, basic computer theory, algorithm theory research, algorithm design and analysis, blockchain technology, system software and software engineering technology, pattern recognition and artificial intelligence, architecture, advanced computing, parallel processing, database technology, computer network and communication technology, information security technology, computer image graphics and its latest hot application technology.

Application Research of Computers has many high-level readers and authors, and its readers are mainly senior and middle-level researchers and engineers engaged in the field of computer science, as well as teachers and students majoring in computer science and related majors in colleges and universities. Over the years, the total citation frequency and Web download rate of Application Research of Computers have been ranked among the top of similar academic journals in this discipline, and the academic papers published are highly popular among the readers for their novelty, academics, foresight, orientation and practicality.


Indexed & Evaluation

  • The Second National Periodical Award 100 Key Journals
  • Double Effect Journal of China Journal Formation
  • the Core Journal of China (Peking University 2023 Edition)
  • the Core Journal for Science
  • Chinese Science Citation Database (CSCD) Source Journals
  • RCCSE Chinese Core Academic Journals
  • Journal of China Computer Federation
  • 2020-2022 The World Journal Clout Index (WJCI) Report of Scientific and Technological Periodicals
  • Full-text Source Journal of China Science and Technology Periodicals Database
  • Source Journal of China Academic Journals Comprehensive Evaluation Database
  • Source Journals of China Academic Journals (CD-ROM Version), China Journal Network
  • 2017-2019 China Outstanding Academic Journals with International Influence (Natural Science and Engineering Technology)
  • Source Journal of Top Academic Papers (F5000) Program of China's Excellent Science and Technology Journals
  • Source Journal of China Engineering Technology Electronic Information Network and Electronic Technology Literature Database
  • Source Journal of British Science Digest (INSPEC)
  • Japan Science and Technology Agency (JST) Source Journal
  • Russian Journal of Abstracts (AJ, VINITI) Source Journals
  • Full-text Journal of EBSCO, USA
  • Cambridge Scientific Abstracts (Natural Sciences) (CSA(NS)) core journals
  • Poland Copernicus Index (IC)
  • Ulrichsweb (USA)