This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESAR cryptographic competition. We identify weaknesses in the state update function of ACORN which result in collisions in the internal state of ACORN. This paper shows that for a given set of key and initialization vector values we can construct two distinct input messages which result in a collision in the ACORN internal state. Using a standard PC the collision can be found almost instantly when the secret key is known. This flaw can be used by a message sender to create a forged message which will be accepted as legitimate
π-Cipher is one of the twenty-nine candidates in the second round of the CAESAR competition for auth...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
In this paper we present an improvement of the collision attack [1] on the authenticated encryption ...
This paper analyzes the authenticated encryption algorithm\ud ACORN, a candidate in the CAESAR crypt...
Abstract. This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESA...
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equ...
Fault attack is one of the most efficient side channel attacks and has attracted much attention in r...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
Secure and efficient authenticated encryption (AE) constructions are important for protecting modern...
Abstract. We present a practical attack on the Panama hash function that generates a collision in 26...
Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which i...
<i>π-Cipher</i> is one of the twenty-nine candidates in the second round of the <i>CAESAR</i> compet...
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality...
π-Cipher is one of the twenty-nine candidates in the second round of the CAESAR competition for auth...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
In this paper we present an improvement of the collision attack [1] on the authenticated encryption ...
This paper analyzes the authenticated encryption algorithm\ud ACORN, a candidate in the CAESAR crypt...
Abstract. This paper analyzes the authenticated encryption algorithm ACORN, a candidate in the CAESA...
The cube attack is an algebraic attack that allows an adversary to extract low degree polynomial equ...
Fault attack is one of the most efficient side channel attacks and has attracted much attention in r...
Free to read on publisher website We investigate six authenticated encryption schemes (ACORN, ASCON-...
Secure and efficient authenticated encryption (AE) constructions are important for protecting modern...
Abstract. We present a practical attack on the Panama hash function that generates a collision in 26...
Abstract. Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which i...
<i>π-Cipher</i> is one of the twenty-nine candidates in the second round of the <i>CAESAR</i> compet...
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality...
International audienceIn this paper we study authenticated encryption algorithms inspired by the OCB...
Authenticated Encryption (AE) is the cryptographic process of providing simultaneous confidentiality...
π-Cipher is one of the twenty-nine candidates in the second round of the CAESAR competition for auth...
An authenticated cipher is a symmetric key cryptographic primitive which protects the confidentialit...
In this paper we present an improvement of the collision attack [1] on the authenticated encryption ...