Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS

CAESAR competition MORUS 0202 electrical engineering, electronic engineering, information engineering Authenticated Encryption 02 engineering and technology Cube Attack 333
DOI: 10.1109/trustcom/bigdatase/icess.2017.337 Publication Date: 2017-09-11T16:47:51Z
ABSTRACT
We investigated the application of cube attacks to MORUS , a candidate in the CAESAR competition. We applied the cube attack to a version of MORUS where the initialization phase is reduced from 16 steps to 4. Our analysis shows that the cube attack can successfully recover the secret key of MORUS -640 with a total complexity of about 2 10 for this reduced version, and similarly for MORUS -1280 with complexity 2 9 . Additionally, we obtained cubes resulting in distinguishers for 5 steps of the initialization of MORUS -1280; these can distinguish the cipher output function from a random function with complexity of 2 8 . All our attacks are verified experimentally. Currently, the cube attack does not threaten the security of MORUS if the full initialization phase is performed.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (11)
CITATIONS (9)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....