Cryptology ePrint Archive: Report 2019/172

Correlation of Quadratic Boolean Functions: Cryptanalysis of All Versions of Full MORUS

Danping Shi and Siwei Sun and Yu Sasaki and Chaoyun Li and Lei Hu

Abstract: We show that the correlation of any quadratic Boolean function can be read out from its so-called disjoint quadratic form. We further propose a polynomial-time algorithm that can transform an arbitrary quadratic Boolean function into its disjoint quadratic form. With this algorithm, the exact correlation of quadratic Boolean functions can be computed efficiently.

We apply this method to analyze the linear trails of MORUS (one of the seven finalists of the CAESAR competition), which are found with the help of a generic model for linear trails of MORUS-like key-stream generators. In our model, any tool for finding linear trails of block ciphers can be used to search for trails of MORUS-like key-stream generators. As a result, a set of trails with correlation $2^{-38}$ is identified for all versions of full MORUS, while the correlations of previously published best trails for MORUS-640 and MORUS-1280 are $2^{-73}$ and $2^{-76}$ respectively (ASIACRYPT 2018). This significantly improves the complexity of the attack on MORUS-1280-256 from $2^{152}$ to $2^{76}$. These new trails also lead to the first distinguishing and message-recovery attacks on MORUS-640-128 and MORUS-1280-128 with surprisingly low complexities around $2^{76}$.

Moreover, we observe that the condition for exploiting these trails in an attack can be more relaxed than previously thought, which shows that the new trails are superior to previously published ones in terms of both correlation and the number of ciphertext blocks involved.

Category / Keywords: secret-key cryptography / Quadratic Boolean function, Disjoint quadratic form, Correlation attack, CAESAR competition, MORUS, MILP

Original Publication (with major differences): IACR-CRYPTO-2019

Date: received 18 Feb 2019, last revised 23 Jun 2019

Contact author: shidanping at iie ac cn,sunsiwei@iie ac cn,sasaki yu@lab ntt co jp,chaoyun li@esat kuleuven be,hulei@iie ac cn

Available format(s): PDF | BibTeX Citation

Version: 20190624:043810 (All versions of this report)

Short URL: ia.cr/2019/172


[ Cryptology ePrint archive ]