@inproceedings{846375410247498f9ab0826e39700f01,

title = "Investigating cube attacks on the authenticated encryption stream cipher ACORN",

abstract = "The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equations from the targeted cryptographic primitive. This work applies the cube attack to a reduced round version of ACORN, a candidate cipher design in the CAESAR cryptographic competition. The cube attack on 477 initialization rounds of ACORN can recover the 128 bit key with a total attack complexity of about 235. We have also shown that linear equations relating the initial state of the full version of ACORN can be easily generated which can lead to state recovery attack with an attack complexity of about 272.8.",

keywords = "ACORN, Authenticated encryption, CAESAR, Cube attack",

author = "Salam, {Md Iftekhar} and Harry Bartlett and Ed Dawson and Josef Pieprzyk and Leonie Simpson and Wong, {Kenneth Koon Ho}",

year = "2016",

doi = "10.1007/978-981-10-2741-3_2",

language = "English",

isbn = "9789811027406",

series = "Communications in Computer and Information Science",

publisher = "Springer, Springer Nature",

pages = "15--26",

editor = "Lynn Batten and Gang Li",

booktitle = "Applications and Techniques in Information Security",

address = "United States",

note = "6th International Conference on Applications and Techniques in Information Security, ATIS 2016 ; Conference date: 26-10-2016 Through 28-10-2016",

}