Authors: Hongluan Zhao; Guoyong Han
Addresses: School of Computer Science and Technology, Shandong Jianzhu University, Fengming Road, Lingang Development Zone, Jinan 250101, Shandong Province, China ' School of Management Engineering, Shandong Jianzhu University, Jinan, China; School of Information Science and Engineering, Shandong Normal University, No. 88 East Wenhua Road, Lixia Zone, Jinan 250014, Shandong, China
Abstract: Biclique cryptanalysis is a typical key-recovery attack can significantly decrease computation and data complexity by utilising the main idea of meet-in-the-middle attack and the principle of biclique structure. In this paper, we first demonstrate the block cipher Midori64/128 and present a general method of biclique attack. Next, we describe the steps in constructing a biclique and attacking a full-round Midori block cipher. By investigating a simple key schedule, we present a full-round biclique cryptanalysis of Midori. Then, we construct a five-round biclique structure of four-dimensional and a four-round biclique structure for Midori64, with data complexity of 236 and 216 and computational complexity of 2126.45 and 2126.69, respectively. Moreover, we use a four-round biclique structure to attack Midori128 with data complexity of 272 and computational complexity of 2127.01. These findings are superior to current results.
Keywords: biclique cryptanalysis; Midori; meet-in-the-middle; MITM; full round; block cipher.
International Journal of Embedded Systems, 2019 Vol.11 No.2, pp.229 - 239
Received: 12 Apr 2017
Accepted: 02 Dec 2017
Published online: 07 Mar 2019 *