Cryptanalysis of MORUS

Tomer Ashur, Maria Eichlseder, Martin M. Lauridsen, Gaëtan Leurent, Brice Minaud, Yann Rotella, Yu Sasaki, Benoît Viguier

Research output: Chapter in Book/Report/Conference proceedingConference contributionAcademicpeer-review

14 Citations (Scopus)

Abstract

MORUS is a high-performance authenticated encryption algorithm submitted to the CAESAR competition, and recently selected as a finalist. There are three versions of MORUS: MORUS-640 with a 128-bit key, and MORUS-1280 with 128-bit or 256-bit keys. For all versions the security claim for confidentiality matches the key size. In this paper, we analyze the components of this algorithm (initialization, state update and tag generation), and report several results. As our main result, we present a linear correlation in the keystream of full MORUS, which can be used to distinguish its output from random and to recover some plaintext bits in the broadcast setting. For MORUS-1280, the correlation is which can be exploited after around encryptions, less than what would be expected for a 256-bit secure cipher. For MORUS-640, the same attack results in a correlation of which does not violate the security claims of the cipher. To identify this correlation, we make use of rotational invariants in MORUS using linear masks that are invariant by word-rotations of the state. This motivates us to introduce single-word versions of MORUS called MiniMORUS, which simplifies the analysis. The attack has been implemented and verified on MiniMORUS, where it yields a correlation of We also study reduced versions of the initialization and finalization of MORUS, aiming to evaluate the security margin of these components. We show a forgery attack when finalization is reduced from 10 steps to 3, and a key-recovery attack in the nonce-misuse setting when initialization is reduced from 16 steps to 10. These additional results do not threaten the full MORUS, but studying all aspects of the design is useful to understand its strengths and weaknesses.

Original languageEnglish
Title of host publicationAdvances in Cryptology – ASIACRYPT 2018 - 24th International Conference on the Theory and Application of Cryptology and Information Security, Proceedings
EditorsThomas Peyrin, Steven Galbraith
Place of PublicationCham
PublisherSpringer
Pages35-64
Number of pages30
ISBN (Electronic)978-3-030-03329-3
ISBN (Print)978-3-030-03328-6
DOIs
Publication statusPublished - 27 Oct 2018
Externally publishedYes
Event24th ternational Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018 - Brisbane, Australia
Duration: 2 Dec 20186 Dec 2018
Conference number: 24
https://asiacrypt.iacr.org/2018/

Publication series

NameLecture Notes in Computer Science
PublisherSpringerLink
Volume11273

Conference

Conference24th ternational Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2018
Abbreviated titleASIACRYPT 2018
Country/TerritoryAustralia
CityBrisbane
Period2/12/186/12/18
Internet address

Keywords

  • MORUS
  • CAESAR
  • Authenticated Encryption
  • Nonce Respecting
  • Linear Cryptanalysis
  • Confidentiality
  • Authenticated encryption
  • Linear cryptanalysis
  • Nonce respecting

Fingerprint

Dive into the research topics of 'Cryptanalysis of MORUS'. Together they form a unique fingerprint.

Cite this