Computer Science ›› 2018, Vol. 45 ›› Issue (4): 152-156.doi: 10.11896/j.issn.1002-137X.2018.04.025

Previous Articles     Next Articles

Distinguishing Attack of MORUS-1280-128

ZHENG Xiu-lin, SONG Hai-yan and FU Yi-peng   

  • Online:2018-04-15 Published:2018-05-11

Abstract: MORUS is an authenticated cipher,which is submitted to CAESAR competition and has been selected into the third-round security evaluation stage.To study the distinguishing attack of MORUS is significant for its security evaluation.This paper studied the distinguishing attack of MORUS-1280-128 in a nonce-resuse scenario.By using this method,the majority ciphertext can be distinguished,and a collision in internal state can be found for a tag forgery attack.The paper’s research results are of great significance for the safety analysis of MORUS.

Key words: Authenticated encryption,MORUS algorithm,Distinguishing attack,Forgery attack

[1] CAESAR-Competition for Authenticated Encryption:Security,Applicability,and Robustness.
[2] DAEMEN J,RIJMEN V.AES and the wide trail design strategy[J].Lecture Notes in Computer Science,2002,2260:108-109.
[3] BERTONI G,DAEMEN J,PEETERS M,et al.Keccak[M]∥Advances in Cryptology-EUROCRYPT 2013.2013:313-314.
[4] WU H J,HUANG T.The Authenticated Cipher MORUS[EB/OL].
[5] DWIVEDI A D,KLOUCEK M,MORAW-IECKI P,et al.SAT-based Cryptanalysis of Authenticated Ciphers from the CAESAR Competition[C]∥International Conference on Security & Cryptography.2017.
[6] ZHANG P,GUAN J,LI J Z,et al.Research on the Confusion and Diffusion Properties of the Initialization of MORUS[J].Journal of Cryptologic Research,2015,2(6):536-548.(in Chinese) 张沛,关杰,李俊志,等.MORUS 算法初始化过程的混乱与扩散性质研究[J].密码学报,2015,2(6):536-548.
[7] SHI T,GUAN J,LI J,et al.Improved Collision Cryptanalysis of Authenticated Cipher MORUS[C]∥ International Conference on Artificial Intelligence & Industrial Engineering.2016.
[8] COPPERSMITH D,HALEVI S,JUTLA C.Cryptanalysis ofStream Ciphers with Linear Masking[C]∥Advances in Crypto-logy-CRYPTO 2002.Springer Heidelberg,2002:515-532.
[9] CHANG Y Q,JIN C H.Linear Distinguishing Attack on Shannon Algorithm[J].Journal of Electronics & Information Technology,2011,33(1):190-193.(in Chinese) 常亚勤,金晨辉.对 Shannon 算法的线性区分攻击[J].电子与信息学报,2011,33(1):190-193.
[10] MAITRA S,PAUL G,GUPTA S S.Attack on broadcast RC4 revisited[M]∥Fast Software Encryption.Springer Berlin Heidelberg,2011:199-217.
[11] WATANABE D,BIRYUKOV A,CANNIERE C D.A Distinguishing Attack of SNOW 2.0 with Linear Masking Method [C]∥Selected Areas in Cryptography,International Workshop(SAC 2003).Ottawa,Canada,DBLP.2003:222-233.
[12] MILEVA A,DIMITROVA V,VELICHKO V V.Analysis of the Authenticated Cipher MORUS(v1)[M]∥Cryptography and Information Security in the Balkans.Springer International Publishing,2015.

No related articles found!
Full text



[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75 .
[3] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[4] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[5] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[6] SHI Wen-jun, WU Ji-gang and LUO Yu-chun. Fast and Efficient Scheduling Algorithms for Mobile Cloud Offloading[J]. Computer Science, 2018, 45(4): 94 -99 .
[7] ZHOU Yan-ping and YE Qiao-lin. L1-norm Distance Based Least Squares Twin Support Vector Machine[J]. Computer Science, 2018, 45(4): 100 -105 .
[8] LIU Bo-yi, TANG Xiang-yan and CHENG Jie-ren. Recognition Method for Corn Borer Based on Templates Matching in Muliple Growth Periods[J]. Computer Science, 2018, 45(4): 106 -111 .
[9] GENG Hai-jun, SHI Xin-gang, WANG Zhi-liang, YIN Xia and YIN Shao-ping. Energy-efficient Intra-domain Routing Algorithm Based on Directed Acyclic Graph[J]. Computer Science, 2018, 45(4): 112 -116 .
[10] CUI Qiong, LI Jian-hua, WANG Hong and NAN Ming-li. Resilience Analysis Model of Networked Command Information System Based on Node Repairability[J]. Computer Science, 2018, 45(4): 117 -121 .