[Resource Topic] 2016/1132: Some results on ACORN

Welcome to the resource topic for 2016/1132

Title:
Some results on ACORN

Authors: Dibyendu Roy, Sourav Mukhopadhyay

Abstract:

In this paper we obtain a weakness in the design specification of ACORN, which is a competitor of CAESAR competition. We show that there exists a probabilistic linear relation between message bits and ciphertext bits, which holds with probability greater than \frac{1}{2}. This is the first paper which finds a probabilistic linear relation between message and corresponding ciphertext bits of ACRON, and which holds with probability greater than \frac{1}{2}. We also propose a new type of CPA attack on ACORN. By our attack method, it is possible to recover full initial state of the encryption phase of the cipher, and the attack has complexity \approx 2^{40}. After obtaining the initial state of the encryption phase, one can invert the associated data loading phase and key-IV initialization phase to recover the secret key bits.

ePrint: https://eprint.iacr.org/2016/1132

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .