We provided comments on a new cryptanalytic result on MISTY1, which is a 64-bit block cipher on the CRYPTREC Candidate Recommended Ciphers List, on July 16th. After that another new cryptanalytic result on MISTY1 with reduced time complexity was published by the International Association for Cryptologic Research (IACR) ePrint Archive on July 30th.
The published paper shows that a 128-bit secret key of full-round MISTY1 can be recovered with a practical time complexity which is equivalent to approximately 269.5 encryption operations, although all (264) pairs of plaintexts and corresponding ciphertexts are required for the attack. Since the required data is huge, this attack is not considered practical. We will continue further evaluation on the security of MISTY1 and report them on the CRYPTREC web site.
Table: Complexities of Integral Cryptanalysis on MISTY1
 Yosuke Todo, Integral Cryptanalysis on Full MISTY1, Advances in Cryptology – CRYPTO 2015, Lecture Notes in Computer Science, Volume 9215, pages 413–432.
 Unit of the required data is a pair of plaintext block and ciphertext block. Both blocks are 64-bit length. The attacks require chosen plaintexts and their corresponding ciphertexts.
 Unit of the time complexity is the computational cost for one block encryption. The time complexity for the key exhaustive search attack for a 128-bit key is 2128.