2015
DOI: 10.1007/978-3-319-23318-5_21
|View full text |Cite
|
Sign up to set email alerts
|

Two Generic Methods of Analyzing Stream Ciphers

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
5
3
1

Relationship

0
9

Authors

Journals

citations
Cited by 10 publications
(10 citation statements)
references
References 18 publications
0
10
0
Order By: Relevance
“…In 2014, Wu had submitted an authenticated encryption cipher, known as ACORN v1 to CAESAR competition. After then, some attacks on ACORN v1 and its tweaked version ACORN v2 were presented in [5][6][7][8][9][10][11]. Besides these attacks, a cube attack on 477 rounds of ACORN v2 was proposed in [12] to recover the 128-bit key with a total attack complexity of 2 35 , and when the goal is to recover one bit of the secret key, 503 rounds of ACORN v2 were attacked.…”
Section: Previous Attacks On Acornmentioning
confidence: 99%
See 1 more Smart Citation
“…In 2014, Wu had submitted an authenticated encryption cipher, known as ACORN v1 to CAESAR competition. After then, some attacks on ACORN v1 and its tweaked version ACORN v2 were presented in [5][6][7][8][9][10][11]. Besides these attacks, a cube attack on 477 rounds of ACORN v2 was proposed in [12] to recover the 128-bit key with a total attack complexity of 2 35 , and when the goal is to recover one bit of the secret key, 503 rounds of ACORN v2 were attacked.…”
Section: Previous Attacks On Acornmentioning
confidence: 99%
“…(2) For t from 1 to N do: (3) D (t) ⟵DEG(State Update 128(S (t− 1) ), D (t− 1) ); (4) Compute DEG(f, D (N) ); (5) Return DEG(f, D (N) ).…”
Section: 32mentioning
confidence: 99%
“…Wang et al [17] recover the state of ACORN in nonce-reuse attack.The cube attack on 477 initialization rounds of ACORN v1 can recover the 128-bit key with a complexity of 2 35 . Jiao et al [18] evaluated the security of ACORN v1 by using linear approximations, which needs about 2 157 tests. Recently, a sat-based cryptanalysis of ACORN v3 is given by Lafitte [19].…”
Section: Introductionmentioning
confidence: 99%
“…There are other analysis results on ACORN such that Liu and Lin [4] described the slid properties and proposed a state recovering attack with computational complexity 2 164 . Then Jiao and Zhang [5] used guessing strategy to give a security evaluation with computational complexity 2 …”
Section: Introductionmentioning
confidence: 99%