Skip to main content
Log in

Real-time state recovery attack against MORUS in nonce-misuse setting

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. The CAESAR Committee. Competition for authenticated encryption: security, applicability, and robustness. 2014. http://competitions.cr.yp.to/caesar.html

  2. Wu H, Huang T. The authenticated cipher MORUS (v1.1). 2016. http://competitions.cr.yp.to/round2/ morusv11.pdf

    Google Scholar 

  3. Mileva A, Dimitrova V, Velichkov V. Analysis of the authenticated cipher MORUS (v1). In: Proceedings of International Conference on Cryptography and Information Security in the Balkans, Koper, 2015. 45–59

    Google Scholar 

  4. Nozaki Y, Yoshikawa M. Power analysis attack for a fast authenticated encryption MORUS. In: Proceedings of International Conference on Applied System Innovation, Sapporo, 2017. 365–368

    Google Scholar 

  5. Dwivedi A D, Klouček M, Morawiecki P, et al. SATbased cryptanalysis of authenticated ciphers from the CAESAR competition. In: Proceedings of International Conference on Security and Cryptography, Madrid, 2017. 237–246

    Google Scholar 

  6. Zhang P, Guan J, Li J Z, et al. Research on the confusion and diffusion properties of the initialization of MORUS. J Cryptol Res, 2015, 2: 536–548

    Google Scholar 

  7. Guan J, Shi T R, Li J Z, et al. Analysis of MORUS against collision attack (in Chinese). J Elec Inf Tech, 2017, 39: 1704–1710

    Google Scholar 

Download references

Acknowledgements

This work was supported by National Natural Science Foundation of China (Grant Nos. 61572516, 61602514, 61272041, 61272488).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tairong Shi.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Shi, T., Guan, J. Real-time state recovery attack against MORUS in nonce-misuse setting. Sci. China Inf. Sci. 62, 39109 (2019). https://doi.org/10.1007/s11432-017-9457-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-017-9457-x

Navigation