Research Article

Two Complementary Truncated Differential Attacks on Midori-64

Volume: 15 Number: 1 March 19, 2026

Two Complementary Truncated Differential Attacks on Midori-64

Abstract

The design of lightweight yet secure block ciphers, particularly for resource-constrained platforms such as RFID tags, tiny sensors, or pocket-sized mobile devices, has been a central focus of symmetric encryption research for over two decades. Midori, introduced by Banik et al. at ASIACRYPT 2015, is one of the most cryptanalyzed lightweight block ciphers and comes in two variants: Midori-64 (64-bit state, 16 rounds) and Midori-128 (128-bit state, 20 rounds), both using a 128-bit key. In this work, we extend the security analysis of Midori-64 via truncated differential techniques, providing a clearer understanding of its resistance against such attacks. We construct two 6-round truncated differentials by precisely computing the propagation probabilities of selected truncated differences through the cipher’s matrix-multiplication layer and tracking their diffusion across rounds. We compute their exact probabilities and use them as distinguishers. By exploiting these two distinguishers, we mount two distinct 10-round truncated differential attacks on Midori-64, representing the first truncated differential attacks reported on the cipher. While the full-round design remains secure, one of our attacks ranks among the best known attacks on 10-round Midori-64.

Keywords

Supporting Institution

TÜBİTAK 1001 Project

Project Number

124F270

References

  1. A. Bogdanov, L. R. Knudsen, G. Leander, C. Paar, A. Poschmann, M. J. B. Robshaw, Y. Seurin, and C. Vikkelsoe, “PRESENT: An Ultra-Lightweight Block Cipher,” in Cryptographic Hardware and Embedded Systems – CHES 2007, ser. Lecture Notes in Computer Science, vol. 4727. Springer, 2007, pp. 450–466.
  2. Z. Gong, S. Nikova, and Y. W. Law, “KLEIN: A New Family of Lightweight Block Ciphers,” in RFID Security and Privacy – 7th Int. Workshop, RFIDSec 2011, ser. Lecture Notes in Computer Science, A. Juels and C. Paar, Eds., vol. 7055. Springer, 2011, pp. 1–18.
  3. J. Borghoff, A. Canteaut, T. Guneysu, E. B. Kavun, M. Knezevic, L. R. Knudsen, G. Leander, V. Nikov, C. Paar, C. Rechberger, P. Rombouts, S. S. Thomsen, and T. Yalc¸ın, “PRINCE– A Low-Latency Block Cipher for Pervasive Computing Applications – Extended Abstract,” in Advances in Cryptology – ASIACRYPT 2012, ser. Lecture Notes in Computer Science, vol. 7658. Springer, 2012, pp. 208–225.
  4. S. Banik, A. Bogdanov, T. Isobe, K. Shibutani, H. Hiwatari, T. Akishita, and F. Regazzoni, “Midori: A Block Cipher for Low Energy,” in Advances in Cryptology—ASIACRYPT 2015, ser. Lecture Notes in Computer Science, vol. 9453. Springer, 2015, pp. 411–436.
  5. E. Biham and A. Shamir, “Differential Cryptanalysis of The Full 16-Round DES,” in Annual international cryptology conference. Springer, 1992, pp. 487–496.
  6. E. Biham, A. Biryukov, and A. Shamir, “Cryptanalysis of Skipjack Reduced to 31 Rounds Using Impossible Differentials,” in Advances in Cryptology – EUROCRYPT ’99, ser. Lecture Notes in Computer Science, vol. 1592. Springer, 1999, pp. 12–23.
  7. L. R. Knudsen, “Truncated and Higher Order Differentials,” in Fast Software Encryption: Second International Workshop, Leuven, Belgium, December 14–16, 1994, Proceedings, ser. Lecture Notes in Computer Science, B. Preneel, Ed., vol. 1008. Springer, 1994, pp. 196–211.
  8. D. A. Wagner, “The Boomerang Attack,” in Fast Software Encryption, 6th International Workshop, FSE ’99, Rome, Italy, March 24–26, 1999, Proceedings, ser. Lecture Notes in Computer Science, L. R. Knudsen, Ed., vol. 1636. Springer, 1999, pp. 156–170.

Details

Primary Language

English

Subjects

Cryptography

Journal Section

Research Article

Publication Date

March 19, 2026

Submission Date

November 16, 2025

Acceptance Date

March 14, 2026

Published in Issue

Year 2026 Volume: 15 Number: 1

APA
Balıkçı, C., & Kara, O. (2026). Two Complementary Truncated Differential Attacks on Midori-64. International Journal of Information Security Science, 15(1), 25-47. https://doi.org/10.55859/ijiss.1824878
AMA
1.Balıkçı C, Kara O. Two Complementary Truncated Differential Attacks on Midori-64. IJISS. 2026;15(1):25-47. doi:10.55859/ijiss.1824878
Chicago
Balıkçı, Can, and Orhun Kara. 2026. “Two Complementary Truncated Differential Attacks on Midori-64”. International Journal of Information Security Science 15 (1): 25-47. https://doi.org/10.55859/ijiss.1824878.
EndNote
Balıkçı C, Kara O (March 1, 2026) Two Complementary Truncated Differential Attacks on Midori-64. International Journal of Information Security Science 15 1 25–47.
IEEE
[1]C. Balıkçı and O. Kara, “Two Complementary Truncated Differential Attacks on Midori-64”, IJISS, vol. 15, no. 1, pp. 25–47, Mar. 2026, doi: 10.55859/ijiss.1824878.
ISNAD
Balıkçı, Can - Kara, Orhun. “Two Complementary Truncated Differential Attacks on Midori-64”. International Journal of Information Security Science 15/1 (March 1, 2026): 25-47. https://doi.org/10.55859/ijiss.1824878.
JAMA
1.Balıkçı C, Kara O. Two Complementary Truncated Differential Attacks on Midori-64. IJISS. 2026;15:25–47.
MLA
Balıkçı, Can, and Orhun Kara. “Two Complementary Truncated Differential Attacks on Midori-64”. International Journal of Information Security Science, vol. 15, no. 1, Mar. 2026, pp. 25-47, doi:10.55859/ijiss.1824878.
Vancouver
1.Can Balıkçı, Orhun Kara. Two Complementary Truncated Differential Attacks on Midori-64. IJISS. 2026 Mar. 1;15(1):25-47. doi:10.55859/ijiss.1824878