Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
AbstractThis paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the integrity component. For the fault attack on the confidentiality component of MORUS, we propose two different types of key recovery. The first type is a partial key recovery using a permanent fault model, except for one of the variants of MORUS where the full key is recovered with this model. The second type is a full key recovery using a transient fault model, at the cost of a higher number of faults compared to the permanent fault model. Finally, we describe a fault attack on the integrity component of MORUS, which performs a forgery using the bit-flipping fault model. View Full-Text
Share & Cite This Article
Salam, I.; Simpson, L.; Bartlett, H.; Dawson, E.; Koon-Ho Wong, K. Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptography 2018, 2, 4.
Salam I, Simpson L, Bartlett H, Dawson E, Koon-Ho Wong K. Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptography. 2018; 2(1):4.Chicago/Turabian Style
Salam, Iftekhar; Simpson, Leonie; Bartlett, Harry; Dawson, Ed; Koon-Ho Wong, Kenneth. 2018. "Fault Attacks on the Authenticated Encryption Stream Cipher MORUS." Cryptography 2, no. 1: 4.
Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.