**Cube Cryptanalysis of Round-Reduced ACORN**

*Jingchun Yang and Meicheng Liu and Dongdai Lin*

**Abstract: **The cube attack is one of the most powerful techniques in cryptanalysis of symmetric cryptographic primitives. The basic idea of cube attack is to determine the value of a polynomial in key bits by summing over a cube (a subset of public variables, e.g., plaintext bits or IV bits). If the degree of the polynomial is relatively low, then we can obtain a low-degree equation in key bits, thus may contribute to reducing the complexity of key recovery.
In this paper, we use cube cryptanalysis to analyze the authenticated stream cipher ACORN (one of the 6 algorithms in the final portfolio of the CAESAR competition), and give some new results in both distinguishing attacks and key recovery attacks. Firstly, we give a new method of finding cube testers, which is based on the greedy algorithm of finding cubes, and the numeric mapping method for estimating the algebraic degree of NFSR-based cryptosystems. We apply it to ACORN, and obtain the best practical distinguishing attacks for its 690-round variant using a cube of size 38, and its 706-round variant using a cube of size 46. Then we theoretically analyze the security bound of ACORN via the division property based cube attack. By exploiting the embedded property, we find some new distinguishers for ACORN, so the zero-sum property of the output of its 775-round variant can be observed with a complexity of $2^{127}$. Finally, we propose a key recovery attack on ACORN reduced to 772 rounds. The time complexity to recover the linear superpoly of the 123-dimensional cube is $2^{127.46}$. As far as we know, this is the best key recovery attack on round-reduced ACORN. It is also worth noting that this work does not threaten the security of ACORN.

**Category / Keywords: **secret-key cryptography / cube cryptanalysis, ACORN, distinguishing attack, key recovery, numeric mapping, division property based cube attack

**Original Publication**** (in the same form): **ISC 2019
**DOI: **10.1007/978-3-030-30215-3_3

**Date: **received 18 Oct 2019

**Contact author: **yangjingchun at iie ac cn,liumeicheng@iie ac cn

**Available format(s): **PDF | BibTeX Citation

**Version: **20191021:082134 (All versions of this report)

**Short URL: **ia.cr/2019/1226

[ Cryptology ePrint archive ]