Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
Technology
T
CAESAR
02 engineering and technology
forgery
004
key recovery
fault attack
MORUS
MORUS; CAESAR; authenticated encryption; key recovery; forgery; fault attack
0202 electrical engineering, electronic engineering, information engineering
authenticated encryption
DOI:
10.3390/cryptography2010004
Publication Date:
2018-01-30T17:13:37Z
AUTHORS (5)
ABSTRACT
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the integrity component. For the fault attack on the confidentiality component of MORUS, we propose two different types of key recovery. The first type is a partial key recovery using a permanent fault model, except for one of the variants of MORUS where the full key is recovered with this model. The second type is a full key recovery using a transient fault model, at the cost of a higher number of faults compared to the permanent fault model. Finally, we describe a fault attack on the integrity component of MORUS, which performs a forgery using the bit-flipping fault model.
SUPPLEMENTAL MATERIAL
Coming soon ....
REFERENCES (16)
CITATIONS (7)
EXTERNAL LINKS
PlumX Metrics
RECOMMENDATIONS
FAIR ASSESSMENT
Coming soon ....
JUPYTER LAB
Coming soon ....