Fault Attacks on the Authenticated Encryption Stream Cipher MORUS

被引:6
|
作者
Salam, Iftekhar [1 ]
Simpson, Leonie [1 ]
Bartlett, Harry [1 ]
Dawson, Ed [1 ]
Wong, Kenneth Koon-Ho [1 ]
机构
[1] Queensland Univ Technol, Sci & Engn Fac, Brisbane, Qld 4000, Australia
关键词
MORUS; CAESAR; authenticated encryption; key recovery; forgery; fault attack;
D O I
10.3390/cryptography2010004
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the integrity component. For the fault attack on the confidentiality component of MORUS, we propose two different types of key recovery. The first type is a partial key recovery using a permanent fault model, except for one of the variants of MORUS where the full key is recovered with this model. The second type is a full key recovery using a transient fault model, at the cost of a higher number of faults compared to the permanent fault model. Finally, we describe a fault attack on the integrity component of MORUS, which performs a forgery using the bit-flipping fault model.
引用
收藏
页码:1 / 18
页数:19
相关论文
共 50 条
  • [1] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS
    Salam, Iftekhar
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Wong, Kenneth Koon-Ho
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 961 - 966
  • [2] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN
    Salam, Md Iftekhar
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Simpson, Leonie
    Wong, Kenneth Koon-Ho
    [J]. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, 2016, 651 : 15 - 26
  • [3] Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
    Salam, Iftekhar
    Ooi, Thian Hooi
    Xue, Luxin
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C. -W.
    [J]. IEEE ACCESS, 2021, 9 : 72568 - 72586
  • [4] Fault Attacks on Stream Cipher Scream
    Du, Shaoyu
    Zhang, Bin
    Li, Zhenqi
    Lin, Dongdai
    [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2015, 2015, 9065 : 50 - 64
  • [5] Design and Simulation of Authenticated Encryption AENOTP Stream Cipher Algorithm
    Hussein, Mohamed Nabil
    Megahed, Mohamed Helmy
    Azeem, Mohamed Hassan Abdel
    [J]. 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 393 - 398
  • [6] Fault attacks on authenticated encryption modes for GIFT
    Liu, Shuai
    Guan, Jie
    Hu, Bin
    [J]. IET INFORMATION SECURITY, 2022, 16 (01) : 51 - 63
  • [7] Improved Collision Cryptanalysis of Authenticated Cipher MORUS
    Shi, Tairong
    Guan, Jie
    Li, Junzhi
    Zhang, Pei
    [J]. PROCEEDINGS OF THE 2016 2ND INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND INDUSTRIAL ENGINEERING (AIIE 2016), 2016, 133 : 429 - 432
  • [8] Prevention of Fault Attacks in ASCON Authenticated Cipher Using Cellular Automata
    Jacob, Joseph
    Joseph, Jossy
    Abinshad, M. K.
    Ambili, K. N.
    Jose, Jimmy
    [J]. CELLULAR AUTOMATA, ACRI 2020, 2021, 12599 : 18 - 25
  • [9] Fault Attacks on XEX Mode with Application to Certain Authenticated Encryption Modes
    Al Mahri, Hassan Qahur
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Wong, Kenneth Koon-Ho
    [J]. INFORMATION SECURITY AND PRIVACY, ACISP 2017, PT I, 2017, 10342 : 285 - 305
  • [10] Statistical Fault Attacks on Nonce-Based Authenticated Encryption Schemes
    Dobraunig, Christoph
    Eichlseder, Maria
    Korak, Thomas
    Lomne, Victor
    Mendel, Florian
    [J]. ADVANCES IN CRYPTOLOGY - ASIACRYPT 2016, PT I, 2016, 10031 : 369 - 395