Journal on Communications ›› 2020, Vol. 41 ›› Issue (8): 11-21.doi: 10.11959/j.issn.1000-436x.2020164

• Papers • Previous Articles     Next Articles

State recovery attack on ACORN v3 in nonce-reuse setting

Guoshuang ZHANG1,2,Xiao CHEN1,2,Dongdai LIN1,2,Fengmei LIU3   

  1. 1 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
    3 Science and Technology on Information Assurance Laboratory,Beijing 100072,China
  • Revised:2020-07-05 Online:2020-08-25 Published:2020-09-05
  • Supported by:
    The National Natural Science Foundation of China(6187204);“The 13th Five-Years” National Cryptogram Development Fund(MMJJ20170201);Beijing Municipal Natural Science Foundation(4202070)

Abstract:

Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2122.5c,where c was the time complexity of solving linear equations.The data complexity and the storage complexity were negligible.Furthermore,according to the analysis on the sense of multiple nonce reuse,it is found that relatively complicated filter function of ACORN v3 makes it infeasible to extract the linear equations about the internal state directly from key streams.Thus,the risk of significantly reducing the attack complexity by increasing the times of nonce reuse can be effectively avoided.

Key words: authenticated cipher, cryptanalysis, ACORN, state recovery attack

CLC Number: 

No Suggested Reading articles found!