Abstract
We propose a state recovery attack on full round of initial two versions of stream cipher ACORN with \(2^{120}\) complexity. It is possible to recover the full state of the 39-th clocking of encryption phase of ACORN using our technique. In this method one needs to inject 326 faults and 10 known plaintext bits. To the best of our knowledge this is the first work which breaks ACORN-v1 and ACORN-v2 by using a practical attack model with a complexity lesser than the complexity of exhaustive search on secret key of 128 bits.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
CAESAR: Competition for authenticated encryption: security, applicability, and robustness. http://competitions.cr.yp.to/caesar.html
Banik, S., Maitra, S.: A differential fault attack on MICKEY 2.0. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 215–232. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40349-1_13
Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family of stream ciphers. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 122–139. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33027-8_8
Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). doi:10.1007/BFb0052259
Dey, P., Rohit, R.S., Adhikari, A.: Full key recovery of ACORN with a single fault. J. Inf. Secur. Appl. 29, 57–64 (2016)
HojsÃk, M., Rudolf, B.: Differential fault analysis of Trivium. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 158–172. Springer, Heidelberg (2008). doi:10.1007/978-3-540-71039-4_10
Hu, Y., Gao, J., Liu, Q., Zhang, Y.: Fault analysis of Trivium. Des. Codes Crypt. 62(3), 289–311 (2012)
Jiao, L., Zhang, B., Wang, M.: Two generic methods of analyzing stream ciphers. In: Lopez, J., Mitchell, C.J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 379–396. Springer, Cham (2015). doi:10.1007/978-3-319-23318-5_21
Karmakar, S., Chowdhury, D.R.: Fault analysis of grain-128 by targeting NFSR. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 298–315. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21969-6_19
Karmakar, S., Chowdhury, D.R.: Differential fault analysis of Mickey-128 2.0. In: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC-2013, pp. 52–59. IEEE Computer Society (2013)
Lafitte, F., Lerman, L., Markowitch, O., Van Heule, D.: SAT-based cryptanalysis of ACORN. IACR Cryptol. ePrint Arch. 2016, 521 (2016)
Maitra, S., Sarkar, S., Baksi, A., Dey, P.: Key recovery from state information of Sprout: application to cryptanalysis and fault attack. IACR Cryptol. ePrint Arch. 2015, 236 (2015)
Roy, D., Mukhopadhyay, S.: Fault analysis and weak key-IV attack on Sprout. IACR Cryptol. ePrint Arch. 2016, 207 (2016)
Roy, D., Mukhopadhyay, S.: Some results on ACORN. IACR Cryptol. ePrint Arch. 2016, 1132 (2016)
Salam, M.I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L., Wong, K.K.H.: Investigating cube attacks on the authenticated encryption stream cipher ACORN. IACR Cryptol. ePrint Arch. 2016, 743 (2016)
Salam, M.I., Wong, K.K.H., Bartlett, H., Simpson, L., Dawson, E., Pieprzyk, J.: Finding state collisions in the authenticated encryption stream cipher acorn. IACR Cryptol. ePrint Arch. 2015, 918 (2015)
Wu, H.: ACORN: a lightweight authenticated cipher (v1). CAESAR First Round Submission (2014). competitions.cr.yp.to/round1/acornv1.pdf
Wu, H.: ACORN: a lightweight authenticated cipher (v2). CAESAR Second Round Submission (2015). competitions.cr.yp.to/round2/acornv2.pdf
Wu, H.: ACORN: a lightweight authenticated cipher (v3). CAESAR Second Round Submission (2016). competitions.cr.yp.to/round3/acornv3.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this paper
Cite this paper
Dalai, D.K., Roy, D. (2017). A State Recovery Attack on ACORN-v1 and ACORN-v2. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_24
Download citation
DOI: https://doi.org/10.1007/978-3-319-64701-2_24
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-64700-5
Online ISBN: 978-3-319-64701-2
eBook Packages: Computer ScienceComputer Science (R0)