2017 14th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC) 2017
DOI: 10.1109/iscisc.2017.8488362
|View full text |Cite
|
Sign up to set email alerts
|

Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
5
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
1
1
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(5 citation statements)
references
References 7 publications
0
5
0
Order By: Relevance
“…Todo et al (2019) [23] introduced a new type of attack, called nonlinear invariant attack, and tested it on block ciphers Scream, iScream, and Midori-64 in a weak-key setting to confirm its accuracy. They reported that if the Midori-64 master key is set weakly, the master key is reached by holding a large number of pairs of the original plaintext and cipher text.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Todo et al (2019) [23] introduced a new type of attack, called nonlinear invariant attack, and tested it on block ciphers Scream, iScream, and Midori-64 in a weak-key setting to confirm its accuracy. They reported that if the Midori-64 master key is set weakly, the master key is reached by holding a large number of pairs of the original plaintext and cipher text.…”
Section: Literature Reviewmentioning
confidence: 99%
“…According to the explanations of Problems 1 and 2 above, when the adversary injects faults two or three times, the fault-free difference must exist in some columns of ∆Z 15 . After a fault attack, each column of candidate Y 16 can be expressed by the Equations (10)- (12). According to Problems 1 and 2 discussed above, the attackers independently induce faults two or three times at the 14th round and take the union of ∅, as shown in Equation 10.…”
Section: Analysis Of Fault Difference Equationsmentioning
confidence: 99%
“…where 3m − 2, 3m − 1 and 3m represent the number of fault attacks and m represents the number of ∅ unions. The attacker can obtain the set of estimated Y 16 , as shown in Equations (11) and (12).…”
Section: Analysis Of Fault Difference Equationsmentioning
confidence: 99%
See 2 more Smart Citations