The design of lightweight yet secure block ciphers, particularly for resource-constrained platforms such as RFID tags, tiny sensors, or pocket-sized mobile devices, has been a central focus of symmetric encryption research for over two decades. Midori, introduced by Banik et al. at ASIACRYPT 2015, is one of the most cryptanalyzed lightweight block ciphers and comes in two variants: Midori-64 (64-bit state, 16 rounds) and Midori-128 (128-bit state, 20 rounds), both using a 128-bit key.
In this work, we extend the security analysis of Midori-64 via truncated differential techniques, providing a clearer understanding of its resistance against such attacks. We construct two 6-round truncated differentials by precisely computing the propagation probabilities of selected truncated differences through the cipher’s matrix-multiplication layer and tracking their diffusion across rounds. We compute their exact probabilities and use them as distinguishers. By exploiting these two distinguishers, we mount two distinct 10-round truncated differential attacks on Midori-64, representing the first truncated differential attacks reported on the cipher. While the full-round design remains secure, one of our attacks ranks among the best known attacks on 10-round Midori-64.
Differential Attack Cryptanalysis Truncated Differential Attack Lightweight Block Cipher Midori Midori-64.
TÜBİTAK 1001 Project
124F270
| Primary Language | English |
|---|---|
| Subjects | Cryptography |
| Journal Section | Research Article |
| Authors | |
| Project Number | 124F270 |
| Submission Date | November 16, 2025 |
| Acceptance Date | March 14, 2026 |
| Publication Date | March 19, 2026 |
| DOI | https://doi.org/10.55859/ijiss.1824878 |
| IZ | https://izlik.org/JA34DU36LA |
| Published in Issue | Year 2026 Volume: 15 Issue: 1 |