Abstract
This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN which result in collisions in the internal state of ACORN. This paper shows that for a given set of key and initialization vector values we can construct two distinct input messages which result in a collision in the ACORN internal state. Using a standard PC the collision can be found almost instantly when the secret key is known. This flaw can be used by a message sender to create a forged message which will be accepted as legitimate.
Original language | English |
---|---|
Title of host publication | Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016 |
Place of Publication | New York |
Publisher | Association for Computing Machinery |
Pages | 1-10 |
Number of pages | 10 |
ISBN (Electronic) | 9781450340427 |
DOIs | |
Publication status | Published - 1 Feb 2016 |
Externally published | Yes |
Event | Australasian Computer Science Week Multiconference, ACSW 2016 - Canberra, Australia Duration: 1 Feb 2016 → 5 Feb 2016 |
Other
Other | Australasian Computer Science Week Multiconference, ACSW 2016 |
---|---|
Country/Territory | Australia |
City | Canberra |
Period | 1/02/16 → 5/02/16 |
Keywords
- ACORN
- AEAD
- Authenticated encryption
- CAESAR
- Collision
- Integrity
- MAC
- Stream cipher
- Symmetric encryption