State Recovery Attack on ACORN V3 in Nonce-Reuse Setting

ZHANG Guoshuang,CHEN Xiao,LIN Dongdai,LIU Fengmei
DOI: https://doi.org/10.11959/j.issn.1000-436x.2020164
2020-01-01
Abstract:Based on differential-algebraic method and guess-and-determine technique,the state recovery attack of ACORN v3 was presented when one pair of key and Nonce was used to encrypt two messages.The time complexity of the attack was 2122.5c,where c was the time complexity of solving linear equations.The data complexity and the storage complexity were negligible.Furthermore,according to the analysis on the sense of multiple nonce reuse,it is found that relatively complicated filter function of ACORN v3 makes it infeasible to extract the linear equations about the internal state directly from key streams.Thus,the risk of significantly reducing the attack complexity by increasing the times of nonce reuse can be effectively avoided.
What problem does this paper attempt to address?