- MUGI
In
cryptography , MUGI is apseudorandom number generator (PRNG) designed for use as astream cipher . It has been recommended for Japanese government use by theCRYPTREC project.MUGI takes a 128-bit secret key and a 128-bit
initial vector (IV). After a key- and IV- setup process, MUGI outputs 64-bit output strings based on the internal state, while updating the internal state after each output block. MUGI has a 1216-bit internal state; there are three 64-bit registers (the "state") and 16 64-bit registers (the "buffer").MUGI uses the non-linear
S-box that was originally defined inAdvanced Encryption Standard (AES). A part of the linear transformation also reuses theMDS matrix of AES. The basic design is influenced by that of Panama.ecurity
As of September 2006, there are no known attacks against MUGI that are faster than serial brute-force of the key space or of the internal state.
In the paper, "A weakness of the linear part of stream cipher MUGI", by GOLIC Jovan Dj, Roy Bimal and Meier Willi, the abstract claims: "The linearly updated component of the stream cipher MUGI, called the buffer, is analyzed theoretically by using the generating function method. In particular, it is proven that the intrinsic response of the buffer, without the feedback from the nonlinearly updated component, consists of binary linear recurring sequences with small linear complexity 32 and with extremely small period 48. It is then shown how this weakness can in principle be used to facilitate the linear cryptanalysis of MUGI with two main objectives: to reconstruct the secret key and to find linear statistical distinguishers."
In the paper, "Analysis of the Non-linear Part of Mugi" by
Alex Biryukov andAdi Shamir , the abstract claims: "This paper presents the results of a preliminary analysis of the stream cipher Mugi. We study the nonlinear component of this cipher and identify several potential weaknesses in its design. While we can not break the full Mugi design, we show that it is extremely sensitive to small variations. For example, it is possible to recover the full 1216-bit state of the cipher and the original 128-bit secret key using just 56 words of known stream and in 214 steps of analysis if the cipher outputs any state word which is different than the one used in the actual design. If the linear part is eliminated from the design, then the secret non-linear 192-bit state can be recovered given only three output words and in just 232 steps. If it is kept in the design but in a simplified form, then the scheme can be broken by an attack which is slightly faster than exhaustive search."References
* cite conference
author = Dai Watanabe, Soichi Furuya, Kazuo Takaragi,Bart Preneel ,
title = A New Keystream Generator MUGI
booktitle = 9th International Workshop onFast Software Encryption (FSE 2002)
pages = pp.179–194
publisher =Springer-Verlag
date = February 2002
location =Leuven
url = http://www.cryptolounge.org/w/images/0/0a/MUGI_FSE2002.pdf
format =PDF
accessdate = 2007-08-07
* cite conference
author = Jovan Dj. Golic
title = A weakness of the Linear Part of Stream Cipher MUGI
booktitle = 11th International Workshop on Fast Software Encryption (FSE 2004)
pages = pp.178–192
publisher = Springer-Verlag
date = February 2004
location =Delhi
* cite conference
author = Alex Biryukov, Adi Shamir
title = Analysis of the Non-linear Part of Mugi
booktitle = 12th International Workshop on Fast Software Encryption (FSE 2005)
pages = pp.320–329
publisher = Springer-Verlag
date = February 2005
location =Paris
url = http://homes.esat.kuleuven.be/~abiryuko/mugi_analysis_8.ps
format =PostScript
accessdate = 2007-08-07External links
* [http://www.sdl.hitachi.co.jp/crypto/mugi/index-e.html MUGI homepage]
Wikimedia Foundation. 2010.