Next Article in Journal
Evaluating the Efficiency of Physical and Cryptographic Security Solutions for Quantum Immune IoT
Previous Article in Journal
On the Cryptographic Features of a VoIP Service
Article Menu

Export Article

Open AccessArticle
Cryptography 2018, 2(1), 4;

Fault Attacks on the Authenticated Encryption Stream Cipher MORUS

Science and Engineering Faculty, Queensland University of Technology, Brisbane QLD 4000, Australia
Author to whom correspondence should be addressed.
Received: 14 December 2017 / Revised: 22 January 2018 / Accepted: 25 January 2018 / Published: 30 January 2018
Full-Text   |   PDF [993 KB, uploaded 30 January 2018]   |  


This paper investigates the application of fault attacks to the authenticated encryption stream cipher algorithm MORUS. We propose fault attacks on MORUS with two different goals: one to breach the confidentiality component, and the other to breach the integrity component. For the fault attack on the confidentiality component of MORUS, we propose two different types of key recovery. The first type is a partial key recovery using a permanent fault model, except for one of the variants of MORUS where the full key is recovered with this model. The second type is a full key recovery using a transient fault model, at the cost of a higher number of faults compared to the permanent fault model. Finally, we describe a fault attack on the integrity component of MORUS, which performs a forgery using the bit-flipping fault model. View Full-Text
Keywords: MORUS; CAESAR; authenticated encryption; key recovery; forgery; fault attack MORUS; CAESAR; authenticated encryption; key recovery; forgery; fault attack

Figure 1

This is an open access article distributed under the Creative Commons Attribution License which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited (CC BY 4.0).

Share & Cite This Article

MDPI and ACS Style

Salam, I.; Simpson, L.; Bartlett, H.; Dawson, E.; Koon-Ho Wong, K. Fault Attacks on the Authenticated Encryption Stream Cipher MORUS. Cryptography 2018, 2, 4.

Show more citation formats Show less citations formats

Note that from the first issue of 2016, MDPI journals use article numbers instead of page numbers. See further details here.

Article Metrics

Article Access Statistics



[Return to top]
Cryptography EISSN 2410-387X Published by MDPI AG, Basel, Switzerland RSS E-Mail Table of Contents Alert
Back to Top