Skip to main content

2018 | OriginalPaper | Buchkapitel

Cryptanalysis of Acorn in Nonce-Reuse Setting

verfasst von : Xiaojuan Zhang, Dongdai Lin

Erschienen in: Information Security and Cryptology

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Acorn is a third-round candidate of the CAESAR competition. It is a lightweight authenticated stream cipher. In this paper, we show how to recover the initial state of Acorn when one pair of Key and IV is used to encrypt three messages. Our method contains two main steps: (1) gathering different states; (2) retrieving linear equations. At the first step, we demonstrate how to gather the relation between states when two different plaintexts are encrypted under the same nonce. And at the second step, we exploit how to retrieve a system of linear equations with respect to the initial state, and how to recover the initial state from this system of equations. We apply this method to both Acorn v2 and Acorn v3. The time complexity to recover the initial state of Acorn v2 is \(2^{78} c\), where c is the time complexity of solving linear equations. It is lower than that of the previous methods. For Acorn v3, we can recover the initial state with the time complexity of \(2^{120.6}c\), lower than that of the exhaustion attack. We also apply it on shrunk ciphers with similar structure and properties of Acorn v2 and Acorn v3 to prove the validity of our method. This paper is the first time to analyze Acorn v3 when a nonce is reused and our method provides some insights into the diffusion ability of such stream ciphers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Anhänge
Nur mit Berechtigung zugänglich
Literatur
4.
Zurück zum Zitat Liu, M., Lin, D.: Cryptanalysis of Lightweight Authenticated Cipher ACORN. Posed on the crypto-competition mailing list (2014) Liu, M., Lin, D.: Cryptanalysis of Lightweight Authenticated Cipher ACORN. Posed on the crypto-competition mailing list (2014)
5.
Zurück zum Zitat Chaigneau, C., Fuhr, T., Gilbert, H.: Full Key-recovery on Acorn in Nonce-reuse and Decryption-misuse settings. Posed on the crypto-competition mailing list (2015) Chaigneau, C., Fuhr, T., Gilbert, H.: Full Key-recovery on Acorn in Nonce-reuse and Decryption-misuse settings. Posed on the crypto-competition mailing list (2015)
6.
Zurück zum Zitat Salam, M.I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L., Wong, K.K.-H.: Investigating cube attacks on the authenticated encryption stream cipher Acorn. In: Batten, L., Li, G. (eds.) ATIS 2016. CCIS, vol. 651, pp. 15–26. Springer, Singapore (2016). https://doi.org/10.1007/978-981-10-2741-3_2 Salam, M.I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L., Wong, K.K.-H.: Investigating cube attacks on the authenticated encryption stream cipher Acorn. In: Batten, L., Li, G. (eds.) ATIS 2016. CCIS, vol. 651, pp. 15–26. Springer, Singapore (2016). https://​doi.​org/​10.​1007/​978-981-10-2741-3_​2
7.
Zurück zum Zitat Salam, M.I., Wong, K.K.-H., Bartlett, H., Simpson, L., Dawson, E., Pieprzyk, J.: Finding state collisions in the authenticated encryption stream cipher Acorn. In: Proceedings of the Australasian Computer Science Week Multiconference, p. 36. ACM (2016) Salam, M.I., Wong, K.K.-H., Bartlett, H., Simpson, L., Dawson, E., Pieprzyk, J.: Finding state collisions in the authenticated encryption stream cipher Acorn. In: Proceedings of the Australasian Computer Science Week Multiconference, p. 36. ACM (2016)
8.
Zurück zum Zitat Lafitte, F., Lerman, L., Markowitch, O., Heule, D.V.: SAT-based cryptanalysis of Acorn. IACR Cryptology ePrint Archive, 521 (2016) Lafitte, F., Lerman, L., Markowitch, O., Heule, D.V.: SAT-based cryptanalysis of Acorn. IACR Cryptology ePrint Archive, 521 (2016)
9.
Zurück zum Zitat Josh, R.J., Sarkar, S.: Some observations on Acorn v1 and Trivia-SC. In: Lightweight Cryptography Workshop, NIST, USA, pp. 20–21 (2015) Josh, R.J., Sarkar, S.: Some observations on Acorn v1 and Trivia-SC. In: Lightweight Cryptography Workshop, NIST, USA, pp. 20–21 (2015)
10.
Zurück zum Zitat Roy, D., Mukhopadhyay, S.: Some results on ACORN. IACR cryptology ePrint report 1132 (2016) Roy, D., Mukhopadhyay, S.: Some results on ACORN. IACR cryptology ePrint report 1132 (2016)
Metadaten
Titel
Cryptanalysis of Acorn in Nonce-Reuse Setting
verfasst von
Xiaojuan Zhang
Dongdai Lin
Copyright-Jahr
2018
DOI
https://doi.org/10.1007/978-3-319-75160-3_21

Premium Partner