Browse > Article
http://dx.doi.org/10.3837/tiis.2019.08.013

Cryptanalysis of the Authentication in ACORN  

Shi, Tairong (Information Science and Technology Institute)
Guan, Jie (Information Science and Technology Institute)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.13, no.8, 2019 , pp. 4060-4075 More about this Journal
Abstract
ACORN is an authenticated encryption algorithm proposed as a candidate in the currently ongoing CAESAR competition. ACORN has a good performance on security and efficiency which has been a third-round candidate. This paper mainly concentrates on the security of ACORN under the forgery attack and the non-repudiation of ACORN. Firstly, we analyze the differential properties of the feedback function in ACRON are analyzed. By taking advantage of these properties, the forgery attacks on round-reduced ACORN are proposed with a success probability higher than $2^{-128}$ when the number of finalization rounds is less than 87. Moreover, the non-repudiation of ACRON in the nonce-reuse setting is analyzed. The known collision can be used to deny the authenticated message with probability $2^{-120}$. This paper demonstrates that ACORN cannot generate the non-repudiation completely. We believe it is an undesirable property indeed.
Keywords
CAESAR competition; Authenticated encryption algorithm; ACORN; Forgery attack; Non-repudiation;
Citations & Related Records
연도 인용수 순위
  • Reference
1 L. Jiao, B. Zhang and M. Wang, "Two Generic Methods of Analyzing Stream Ciphers," in Proc. of ISC 2015, pp. 379-396, Sep. 9-11, 2015.
2 F. Lafitte, L. Lerman, O. Markowitch et al., "SAT-based cryptanalysis of ACORN,".
3 X Zhang, X Feng, D Lin, et al, "Fault Attack on the Authenticated Cipher ACORN v2," Security & Communication Networks, 2017, 1-16, 2017.
4 Siddhanti A A, Maitra S, Sinha N, "Certain Observations on ACORN v3 and the Implications to TMDTO Attacks," in Proc. of Security, Privacy, and Applied Cryptography Engineering, pp. 264-280, Dec. 13-17, 2017.
5 P. Zhang, J. Guan, J. Li et al., "Research on State Collisions of Authenticated Cipher ACORN," in Proc. of ICSMIM 2015, pp.459-465, July 23-24, 2016.
6 S. Steve, "Formal analysis of a non-repudiation protocol," in Proc. of CSFW 1998, pp. 54-65, June 9-11, 1998.
7 "SHA-3 Competition (2007-2012)," Feb. 2005.
8 M. Bellare and C. Namprempre, "Authenticated encryption: Relations among notions and analysis of the generic composition paradigm," Journal of Cryptology, vol. 21, no. 4, pp. 469-491, Oct. 2008.   DOI
9 J. Daemen and V. Rijmen, "The Design of Rijndael: AES-the advanced encryption standard," Springer, Berlin, 2002.
10 "Caesar: Competition for authenticated encryption: Security, applicability, and robustness," Aug. 2016.
11 P. Hu, H. Ning, T. Qiu et al., "Security and Privacy Preservation Scheme of Face Identification and Resolution Framework Using Fog Computing in Internet of Things," IEEE Internet of Thingsf Journal, vol. 4, no. 5, pp. 1143-1155, Jan. 2017.   DOI
12 Q. Xu, P. Ren, H. Song et al., "Security Enhancement for IoT Communications Exposed to Eavesdroppers with Uncertain Locations," IEEE Access, vol. 4, pp. 2840-2853, Jun. 2016.   DOI
13 V. T. Hoang, T. Krovetz, and P. Rogaway, "Robust authenticated-encryption: AEZ and the problem that it solves," in Proc. of EUROCRYPT 2015, pp. 15-44, April 26-30, 2015.
14 S. Javanmardi, M. Shojafar, S. Shariatmadari et al., "FRTRUST: a fuzzy reputation based model for trust management in semantic P2P grids," International Journal of Grid & Utility Computing, vol. 6, no. 1, pp. 57-66, Apr. 2014.   DOI
15 C. Dobrauning, M. Eichlseder and F. Mendel, "Heuristic Tool for Linear Cryptanalysis with Applications to CAESAR Candidates," in Proc. of ASIACRYPT 2014, pp.490-509, December 7-11, 2014.
16 T. Peyrin, S. M. Sim, L. Wang et al., "Cryptanalysis of JAMBU," in Proc. of FSE 2015, pp. 264-281, March 8-11, 2015.
17 T. Fuhr, G. Leurent and V. Suder, "Collision Attacks against CAESAR Candidates Forgery and Key-Recovery against AEZ and Marble," in Proc. of ASIACRYPT 2015, pp. 510-532, November 29 - December 3, 2015.
18 H. J. Wu, "ACORN: A Lightweight Authenticated Cipher (v3)," Aug. 2015.
19 C. Colin, F.Thomas, and G. Henri, "Full key-recovery on ACORN in nonce-reuse and decryption misuse settings," 2015.
20 M. C. Liu and D. D. Lin, "Cryptanalysis of Lightweight Authenticated Cipher ACORN," 2014.
21 M. I. Salam, K. K. Wong, H. Bartlett et al., "Finding state collisions in the authenticated encryption stream cipher ACORN," in Proc. of Australasian Computer Science Week Multiconference, pp. 36-56, February 2-5, 2016.
22 M. I. Salam , H. Bartlett , E. Dawson et al., "Investigating Cube Attacks on the Authenticated Encryption Stream Cipher ACORN," in Proc. of Applications and Techniques in Information Security, pp.15-26, Oct 26-28, 2016.
23 S. Wang, B. Hu, Y. Liu et al., "Nonce-reuse Attack on Authenticated Cipher ACORN". in Proc. of AICS 2016, pp.379-385, September 20-21 2016.