Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN

被引:22
|
作者
Salam, Md Iftekhar [1 ]
Bartlett, Harry [1 ]
Dawson, Ed [1 ]
Pieprzyk, Josef [1 ,2 ]
Simpson, Leonie [1 ]
Wong, Kenneth Koon-Ho [1 ]
机构
[1] Queensland Univ Technol, Sci & Engn Fac, Brisbane, Qld 4000, Australia
[2] Polish Acad Sci, Inst Comp Sci, Warsaw, Poland
关键词
CAESAR; Authenticated Encryption; Cube attack; ACORN;
D O I
10.1007/978-981-10-2741-3_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equations from the targeted cryptographic primitive. This work applies the cube attack to a reduced round version of ACORN, a candidate cipher design in the CAESAR cryptographic competition. The cube attack on 477 initialization rounds of ACORN can recover the 128 bit key with a total attack complexity of about 2(35). We have also shown that linear equations relating the initial state of the full version of ACORN can be easily generated which can lead to state recovery attack with an attack complexity of about 2(72.8).
引用
收藏
页码:15 / 26
页数:12
相关论文
共 50 条
  • [1] Investigating Cube Attacks on the Authenticated Encryption Stream Cipher MORUS
    Salam, Iftekhar
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Pieprzyk, Josef
    Wong, Kenneth Koon-Ho
    [J]. 2017 16TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS / 11TH IEEE INTERNATIONAL CONFERENCE ON BIG DATA SCIENCE AND ENGINEERING / 14TH IEEE INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS, 2017, : 961 - 966
  • [2] Fault Attacks on the Authenticated Encryption Stream Cipher MORUS
    Salam, Iftekhar
    Simpson, Leonie
    Bartlett, Harry
    Dawson, Ed
    Wong, Kenneth Koon-Ho
    [J]. CRYPTOGRAPHY, 2018, 2 (01) : 1 - 18
  • [3] Improved Cube Attacks on Some Authenticated Encryption Ciphers and Stream Ciphers in the Internet of Things
    He, Yu
    Wang, Gaoli
    Li, Wenshan
    Ren, Yizhi
    [J]. IEEE ACCESS, 2020, 8 : 20920 - 20930
  • [4] Random Differential Fault Attacks on the Lightweight Authenticated Encryption Stream Cipher Grain-128AEAD
    Salam, Iftekhar
    Ooi, Thian Hooi
    Xue, Luxin
    Yau, Wei-Chuen
    Pieprzyk, Josef
    Phan, Raphael C. -W.
    [J]. IEEE ACCESS, 2021, 9 : 72568 - 72586
  • [5] Design and Simulation of Authenticated Encryption AENOTP Stream Cipher Algorithm
    Hussein, Mohamed Nabil
    Megahed, Mohamed Helmy
    Azeem, Mohamed Hassan Abdel
    [J]. 2017 13TH INTERNATIONAL COMPUTER ENGINEERING CONFERENCE (ICENCO), 2017, : 393 - 398
  • [6] Strengthening ACORN Authenticated Cipher with Cellular Automata
    Joseph, Jossy
    Jacob, Joseph
    Abinshad, M. K.
    Ambili, K. N.
    Jose, Jimmy
    [J]. CELLULAR AUTOMATA, ACRI 2020, 2021, 12599 : 8 - 17
  • [7] Research on State Collisions of Authenticated Cipher ACORN
    Zhang, Pei
    Guan, Jie
    Li, Junzhi
    Shi, Tairong
    [J]. PROCEEDINGS OF THE 2015 4TH INTERNATIONAL CONFERENCE ON SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, 2016, 43 : 459 - 465
  • [8] Nonce-reuse Attack on Authenticated Cipher ACORN
    Wang, Sen-peng
    Hu, Bin
    Liu, Yan
    Zhou, Zi-Yuan
    [J]. INTERNATIONAL CONFERENCE ON ARTIFICIAL INTELLIGENCE AND COMPUTER SCIENCE (AICS 2016), 2016, : 379 - 385
  • [9] Fault Attack on the Authenticated Cipher ACORN v2
    Zhang, Xiaojuan
    Feng, Xiutao
    Lin, Dongdai
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2017,
  • [10] Specific Authenticated Encryption Algorithm Based on SM4 Under Framework of Stream Cipher
    Li, Hu
    Peng, Changgen
    Hou, Jinqiu
    [J]. Computer Engineering and Applications, 2024, 60 (02) : 272 - 278