%0 Journal Article %T Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) %J The ISC International Journal of Information Security %I Iranian Society of Cryptology %Z 2008-2045 %A Rezaei Shahmirzdi, A. %A Azimi, A. %A Salmasizadeh, M. %A Mohajeri, J. %A Aref, M. R. %D 2018 %\ 01/01/2018 %V 10 %N 1 %P 3-13 %! Impossible Differential Cryptanalysis of Reduced-Round Midori64 Block Cipher (Extended Version) %K Midori %K block cipher %K impossible differential attack %K Cryptanalysis %R 10.22042/isecure.2018.110672.399 %X Impossible differential attack is a well-known mean to examine robustness of block ciphers. Using impossible differential cryptanalysis, we analyze security of a family of lightweight block ciphers, named Midori, that are designed considering low energy consumption. Midori state size can be either 64 bits for Midori64 or 128 bits for Midori128; however, both versions have key size equal to 128 bits. In this paper, we mainly study security of Midori64. To this end, we use various techniques such as early-abort, memory reallocation, miss-in-the-middle and turning to account the inadequate key schedule algorithm of Midori64. We first show two new 7round impossible differential characteristics which are, to the best of our knowledge, the longest impossible differential characteristics found for Midori64. Based on the new characteristics, we mount three impossible differential attacks for 10, 11, and 12 rounds on Midori64 with 2 87.7 , 2 90.63 , and 2 90.51 time complexity, respectively, to retrieve the master-key. %U https://www.isecure-journal.com/article_57307_b1cced248995ff3b98bf42a1afe95acb.pdf