Midori

Midori: a block cipher for low energy. In the past few years, lightweight cryptography has become a popular research discipline with a number of ciphers and hash functions proposed. The designers’ focus has been predominantly to minimize the hardware area, while other goals such as low latency have been addressed rather recently only. However, the optimization goal of low energy for block cipher design has not been explicitly addressed so far. At the same time, it is a crucial measure of goodness for an algorithm. Indeed, a cipher optimized with respect to energy has wide applications, especially in constrained environments running on a tight power/energy budget such as medical implants. This paper presents the block cipher Midori (the name of the cipher is the Japanese translation for the word Green) that is optimized with respect to the energy consumed by the circuit per bt in encryption or decryption operation. We deliberate on the design choices that lead to low energy consumption in an electrical circuit, and try to optimize each component of the circuit as well as its entire architecture for energy. An added motivation is to make both encryption and decryption functionalities available by small tweak in the circuit that would not incur significant area or energy overheads. We propose two energy-efficient block ciphers Midori128 and Midori64 with block sizes equal to 128 and 64 bits respectively. These ciphers have the added property that a circuit that provides both the functionalities of encryption and decryption can be designed with very little overhead in terms of area and energy. We compare our results with other ciphers with similar characteristics: it was found that the energy consumptions of Midori64 and Midori128 are by far better when compared ciphers like PRINCE and NOEKEON.


References in zbMATH (referenced in 21 articles )

Showing results 1 to 20 of 21.
Sorted by year (citations)

1 2 next

  1. Beierle, Christof; Biryukov, Alex; Udovenko, Aleksei: On degree-(d) zero-sum sets of full rank (2020)
  2. Beyne, Tim: Block cipher invariants as eigenvectors of correlation matrices (2020)
  3. Liu, Yunwen; Zhang, Wenying; Sun, Bing; Rijmen, Vincent; Liu, Guoqiang; Li, Chao; Fu, Shaojing; Cao, Meichun: The phantom of differential characteristics (2020)
  4. Roh, Dongyoung; Koo, Bonwook; Jung, Younghoon; Jeong, Il Woong; Lee, Dong-Geon; Kwon, Daesung; Kim, Woo-Hwan: Revised version of block cipher CHAM (2020)
  5. Tian, Shizhu; Boura, Christina; Perrin, Léo: Boomerang uniformity of popular S-box constructions (2020)
  6. Zhao, Boxin; Dong, Xiaoyang; Meier, Willi; Jia, Keting; Wang, Gaoli: Generalized related-key rectangle attacks on block ciphers with linear key schedule: applications to SKINNY and GIFT (2020)
  7. Fu, Shihui; Feng, Xiutao: Involutory differentially 4-uniform permutations from known constructions (2019)
  8. Todo, Yosuke; Leander, Gregor; Sasaki, Yu: Nonlinear invariant attack: practical attack on full SCREAM, iSCREAM, and Midori64 (2019)
  9. Koo, Bonwook; Roh, Dongyoung; Kim, Hyeonjin; Jung, Younghoon; Lee, Dong-Geon; Kwon, Daesung: CHAM: a family of lightweight block ciphers for resource-constrained devices (2018)
  10. Liu, Yunwen; Rijmen, Vincent: New observations on invariant subspace attack (2018)
  11. Liu, Yunwen; Rijmen, Vincent; Leander, Gregor: Nonlinear diffusion layers (2018)
  12. Banik, Subhadeep; Pandey, Sumit Kumar; Peyrin, Thomas; Sasaki, Yu; Sim, Siang Meng; Todo, Yosuke: GIFT: a small present. Towards reaching the limit of lightweight encryption (2017)
  13. Sasaki, Yu; Todo, Yosuke: New impossible differential search tool from design and cryptanalysis aspects. Revealing structural properties of several ciphers (2017)
  14. Banik, Subhadeep; Bogdanov, Andrey; Regazzoni, Francesco: Atomic-AES: a compact implementation of the AES encryption/decryption core (2016)
  15. Beierle, Christof; Jean, Jérémy; Kölbl, Stefan; Leander, Gregor; Moradi, Amir; Peyrin, Thomas; Sasaki, Yu; Sasdrich, Pascal; Sim, Siang Meng: The (\mathttSKINNY) family of block ciphers and its low-latency variant (\mathttMANTIS) (2016)
  16. Gérault, David; Lafourcade, Pascal: Related-key cryptanalysis of Midori (2016)
  17. Grassi, Lorenzo; Rechberger, Christian: Practical low data-complexity subspace-trail cryptanalysis of round-reduced PRINCE (2016)
  18. Moradi, Amir; Schneider, Tobias: Side-channel analysis protection and low-latency in action -- case study of PRINCE and Midori (2016)
  19. Picek, Stjepan; Yang, Bohan; Mentens, Nele: A search strategy to optimize the affine variant properties of S-boxes (2016)
  20. Todo, Yosuke; Leander, Gregor; Sasaki, Yu: Nonlinear invariant attack. Practical attack on full SCREAM, iSCREAM, and Midori64 (2016)

1 2 next