A state recovery attack on ACORN-v1 and ACORN-v2

3Citations
Citations of this article
4Readers
Mendeley users who have this article in their library.
Get full text

Abstract

We propose a state recovery attack on full round of initial two versions of stream cipher ACORN with 2120 complexity. It is possible to recover the full state of the 39-th clocking of encryption phase of ACORN using our technique. In this method one needs to inject 326 faults and 10 known plaintext bits. To the best of our knowledge this is the first work which breaks ACORN-v1 and ACORN-v2 by using a practical attack model with a complexity lesser than the complexity of exhaustive search on secret key of 128 bits.

Author supplied keywords

Cite

CITATION STYLE

APA

Dalai, D. K., & Roy, D. (2017). A state recovery attack on ACORN-v1 and ACORN-v2. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 10394 LNCS, pp. 332–345). Springer Verlag. https://doi.org/10.1007/978-3-319-64701-2_24

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free