Investigating cube attacks on the authenticated encryption stream cipher ACORN

Md Iftekhar Salam*, Harry Bartlett, Ed Dawson, Josef Pieprzyk, Leonie Simpson, Kenneth Koon Ho Wong

*Corresponding author for this work

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contributionpeer-review

28 Citations (Scopus)

Abstract

The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equations from the targeted cryptographic primitive. This work applies the cube attack to a reduced round version of ACORN, a candidate cipher design in the CAESAR cryptographic competition. The cube attack on 477 initialization rounds of ACORN can recover the 128 bit key with a total attack complexity of about 235. We have also shown that linear equations relating the initial state of the full version of ACORN can be easily generated which can lead to state recovery attack with an attack complexity of about 272.8.

Original languageEnglish
Title of host publicationApplications and Techniques in Information Security
Subtitle of host publication6th International Conference, ATIS 2016, Proceedings
EditorsLynn Batten, Gang Li
Place of PublicationSingapore
PublisherSpringer, Springer Nature
Pages15-26
Number of pages12
ISBN (Electronic)9789811027413
ISBN (Print)9789811027406
DOIs
Publication statusPublished - 2016
Externally publishedYes
Event6th International Conference on Applications and Techniques in Information Security, ATIS 2016 - Cairns, Australia
Duration: 26 Oct 201628 Oct 2016

Publication series

NameCommunications in Computer and Information Science
Volume651
ISSN (Print)18650929

Other

Other6th International Conference on Applications and Techniques in Information Security, ATIS 2016
Country/TerritoryAustralia
CityCairns
Period26/10/1628/10/16

Keywords

  • ACORN
  • Authenticated encryption
  • CAESAR
  • Cube attack

Fingerprint

Dive into the research topics of 'Investigating cube attacks on the authenticated encryption stream cipher ACORN'. Together they form a unique fingerprint.

Cite this