skip to main content
10.1145/2843043.2843353acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesaus-cswConference Proceedingsconference-collections
research-article

Finding state collisions in the authenticated encryption stream cipher ACORN

Authors Info & Claims
Published:01 February 2016Publication History

ABSTRACT

This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN which result in collisions in the internal state of ACORN. This paper shows that for a given set of key and initialization vector values we can construct two distinct input messages which result in a collision in the ACORN internal state. Using a standard PC the collision can be found almost instantly when the secret key is known. This flaw can be used by a message sender to create a forged message which will be accepted as legitimate.

References

  1. Wu, H., ACORN: A Lightweight Authenticated Cipher (v1). CAESAR Competition. Retrieved from http://competitions.cr.yp.to/round1/acornv1.pdf, Accessed 29 May 2015.Google ScholarGoogle Scholar
  2. CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness. Available from: http://competitions.cr.yp.to/index.html, Accessed 10 September 2015.Google ScholarGoogle Scholar
  3. Wu, H., ACORN: A Lightweight Authenticated Cipher (v2). CAESAR Competition. Retrieved from http://competitions.cr.yp.to/round2/acornv2.pdf, Accessed 10 September 2015.Google ScholarGoogle Scholar
  4. Liu, M. and Lin, D., Cryptanalysis of Lightweight Authenticated Cipher Acorn. Cryptographic Competitions Mailing List. Retrieved from https://groups.google.com/forum/#!topic/crypto-competitions/2mrDnyb9hfM, Accessed 29 May 2015.Google ScholarGoogle Scholar
  5. Chaigneau C., Fuhr T., and H., G., Full Key-Recovery on ACORN in Nonce-Reuse and Decryption-Misuse Settings. Cryptographic Competitions Mailing List. Retrieved from https://groups.google.com/forum/#!topic/crypto-competitions/RTtZvFZay7k, Accessed 10 August 2015.Google ScholarGoogle Scholar
  6. Courtois, N., Klimov, A., Patarin, J., and Shamir, A., Efficient Algorithms for Solving Overdefined Systems of Multivariate Polynomial Equations. In B. Preneel (Ed.), Advances in Cryptology - EUROCRYPT 2000, Vol. 1807, pp. 392--407, Springer Berlin Heidelberg, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Sage Mathematics Software (Version 6.4.1), The Sage Developers, 2015, http://www.sagemath.org.Google ScholarGoogle Scholar
  8. Buchberger, B., An Algorithm for Finding the Bases Elements of the Residue Class Ring Modulo a Zero Dimensional Polynomial Ideal (German). PhD Thesis, Univ. of Innsbruck, 1965.Google ScholarGoogle Scholar

Index Terms

  1. Finding state collisions in the authenticated encryption stream cipher ACORN

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      ACSW '16: Proceedings of the Australasian Computer Science Week Multiconference
      February 2016
      654 pages
      ISBN:9781450340427
      DOI:10.1145/2843043

      Copyright © 2016 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 1 February 2016

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      ACSW '16 Paper Acceptance Rate77of172submissions,45%Overall Acceptance Rate204of424submissions,48%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader