Finding state collisions in the authenticated encryption stream cipher ACORN

Md Iftekhar Salam, Leonie Simpson, Kenneth Koon Ho Wong, Ed Dawson, Harry Bartlett, Josef Pieprzyk

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

5 Citations (Scopus)

Abstract

This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN which result in collisions in the internal state of ACORN. This paper shows that for a given set of key and initialization vector values we can construct two distinct input messages which result in a collision in the ACORN internal state. Using a standard PC the collision can be found almost instantly when the secret key is known. This flaw can be used by a message sender to create a forged message which will be accepted as legitimate.

Original languageEnglish
Title of host publicationProceedings of the Australasian Computer Science Week Multiconference, ACSW 2016
Place of PublicationNew York
PublisherAssociation for Computing Machinery
Pages1-10
Number of pages10
ISBN (Electronic)9781450340427
DOIs
Publication statusPublished - 1 Feb 2016
Externally publishedYes
EventAustralasian Computer Science Week Multiconference, ACSW 2016 - Canberra, Australia
Duration: 1 Feb 20165 Feb 2016

Other

OtherAustralasian Computer Science Week Multiconference, ACSW 2016
Country/TerritoryAustralia
CityCanberra
Period1/02/165/02/16

Keywords

  • ACORN
  • AEAD
  • Authenticated encryption
  • CAESAR
  • Collision
  • Integrity
  • MAC
  • Stream cipher
  • Symmetric encryption

Fingerprint

Dive into the research topics of 'Finding state collisions in the authenticated encryption stream cipher ACORN'. Together they form a unique fingerprint.

Cite this