Skip to main content

A State Recovery Attack on ACORN-v1 and ACORN-v2

  • Conference paper
  • First Online:
Network and System Security (NSS 2017)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 10394))

Included in the following conference series:

Abstract

We propose a state recovery attack on full round of initial two versions of stream cipher ACORN with \(2^{120}\) complexity. It is possible to recover the full state of the 39-th clocking of encryption phase of ACORN using our technique. In this method one needs to inject 326 faults and 10 known plaintext bits. To the best of our knowledge this is the first work which breaks ACORN-v1 and ACORN-v2 by using a practical attack model with a complexity lesser than the complexity of exhaustive search on secret key of 128 bits.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. CAESAR: Competition for authenticated encryption: security, applicability, and robustness. http://competitions.cr.yp.to/caesar.html

  2. Banik, S., Maitra, S.: A differential fault attack on MICKEY 2.0. In: Bertoni, G., Coron, J.-S. (eds.) CHES 2013. LNCS, vol. 8086, pp. 215–232. Springer, Heidelberg (2013). doi:10.1007/978-3-642-40349-1_13

    Chapter  Google Scholar 

  3. Banik, S., Maitra, S., Sarkar, S.: A differential fault attack on the grain family of stream ciphers. In: Prouff, E., Schaumont, P. (eds.) CHES 2012. LNCS, vol. 7428, pp. 122–139. Springer, Heidelberg (2012). doi:10.1007/978-3-642-33027-8_8

    Chapter  Google Scholar 

  4. Biham, E., Shamir, A.: Differential fault analysis of secret key cryptosystems. In: Kaliski, B.S. (ed.) CRYPTO 1997. LNCS, vol. 1294, pp. 513–525. Springer, Heidelberg (1997). doi:10.1007/BFb0052259

    Chapter  Google Scholar 

  5. Dey, P., Rohit, R.S., Adhikari, A.: Full key recovery of ACORN with a single fault. J. Inf. Secur. Appl. 29, 57–64 (2016)

    Google Scholar 

  6. Hojsík, M., Rudolf, B.: Differential fault analysis of Trivium. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 158–172. Springer, Heidelberg (2008). doi:10.1007/978-3-540-71039-4_10

    Chapter  Google Scholar 

  7. Hu, Y., Gao, J., Liu, Q., Zhang, Y.: Fault analysis of Trivium. Des. Codes Crypt. 62(3), 289–311 (2012)

    Article  MathSciNet  MATH  Google Scholar 

  8. Jiao, L., Zhang, B., Wang, M.: Two generic methods of analyzing stream ciphers. In: Lopez, J., Mitchell, C.J. (eds.) ISC 2015. LNCS, vol. 9290, pp. 379–396. Springer, Cham (2015). doi:10.1007/978-3-319-23318-5_21

    Chapter  Google Scholar 

  9. Karmakar, S., Chowdhury, D.R.: Fault analysis of grain-128 by targeting NFSR. In: Nitaj, A., Pointcheval, D. (eds.) AFRICACRYPT 2011. LNCS, vol. 6737, pp. 298–315. Springer, Heidelberg (2011). doi:10.1007/978-3-642-21969-6_19

    Chapter  Google Scholar 

  10. Karmakar, S., Chowdhury, D.R.: Differential fault analysis of Mickey-128 2.0. In: Workshop on Fault Diagnosis and Tolerance in Cryptography - FDTC-2013, pp. 52–59. IEEE Computer Society (2013)

    Google Scholar 

  11. Lafitte, F., Lerman, L., Markowitch, O., Van Heule, D.: SAT-based cryptanalysis of ACORN. IACR Cryptol. ePrint Arch. 2016, 521 (2016)

    Google Scholar 

  12. Maitra, S., Sarkar, S., Baksi, A., Dey, P.: Key recovery from state information of Sprout: application to cryptanalysis and fault attack. IACR Cryptol. ePrint Arch. 2015, 236 (2015)

    Google Scholar 

  13. Roy, D., Mukhopadhyay, S.: Fault analysis and weak key-IV attack on Sprout. IACR Cryptol. ePrint Arch. 2016, 207 (2016)

    Google Scholar 

  14. Roy, D., Mukhopadhyay, S.: Some results on ACORN. IACR Cryptol. ePrint Arch. 2016, 1132 (2016)

    Google Scholar 

  15. Salam, M.I., Bartlett, H., Dawson, E., Pieprzyk, J., Simpson, L., Wong, K.K.H.: Investigating cube attacks on the authenticated encryption stream cipher ACORN. IACR Cryptol. ePrint Arch. 2016, 743 (2016)

    Google Scholar 

  16. Salam, M.I., Wong, K.K.H., Bartlett, H., Simpson, L., Dawson, E., Pieprzyk, J.: Finding state collisions in the authenticated encryption stream cipher acorn. IACR Cryptol. ePrint Arch. 2015, 918 (2015)

    Google Scholar 

  17. Wu, H.: ACORN: a lightweight authenticated cipher (v1). CAESAR First Round Submission (2014). competitions.cr.yp.to/round1/acornv1.pdf

  18. Wu, H.: ACORN: a lightweight authenticated cipher (v2). CAESAR Second Round Submission (2015). competitions.cr.yp.to/round2/acornv2.pdf

  19. Wu, H.: ACORN: a lightweight authenticated cipher (v3). CAESAR Second Round Submission (2016). competitions.cr.yp.to/round3/acornv3.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Deepak Kumar Dalai .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this paper

Cite this paper

Dalai, D.K., Roy, D. (2017). A State Recovery Attack on ACORN-v1 and ACORN-v2. In: Yan, Z., Molva, R., Mazurczyk, W., Kantola, R. (eds) Network and System Security. NSS 2017. Lecture Notes in Computer Science(), vol 10394. Springer, Cham. https://doi.org/10.1007/978-3-319-64701-2_24

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-64701-2_24

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-64700-5

  • Online ISBN: 978-3-319-64701-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics