A multi-step key recovery attack on reduced round Salsa and ChaCha

被引:1
|
作者
Garai, Hirendra Kumar [1 ,3 ]
Dey, Sabyasachi [2 ]
机构
[1] BITS Pilani, Hyderabad Campus, Hyderabad, India
[2] Birla Inst Technol & Sci BITS, Pilani, India
[3] BITS Pilani, Math Dept, Hyderabad Campus, Hyderabad, India
关键词
ARX; ChaCha; differential cryptanalysis; key recovery attack; Salsa; CRYPTANALYSIS;
D O I
10.1080/01611194.2024.2342918
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper develops a significantly enhanced attack on the ciphers Salsa and ChaCha. The existing attacks against these ciphers are mainly differential attacks. In this work, we produce an attack on 7.5-round Salsa and 6.5-round ChaCha20. These are the maiden key-recovery attacks on those versions of the two ciphers, in which we recover the key in multiple steps using several distinguishers. In comparison to the previous best-known attack against 7-round Salsa, the new attack method offers an improvement of 27.5 times, while on 7.5-round Salsa20 and 6.5-round ChaCha20 our attack is the only existing one.
引用
收藏
页数:16
相关论文
共 50 条
  • [21] Multi-layer episode filtering for the multi-step attack detection
    Soleimani, Mahbobeh
    Ghorbani, Ali A.
    COMPUTER COMMUNICATIONS, 2012, 35 (11) : 1368 - 1379
  • [22] Vulnerability Correlation, Multi-step Attack and Exploit Chain in Breach and Attack Simulation
    Chen, Junhan
    Liang, Rufeng
    Zhang, Man
    Zheng, Chengcong
    Huang, Xun
    Lu, Hui
    Yu, Xiang
    Tian, Zhihong
    2023 IEEE 12TH INTERNATIONAL CONFERENCE ON CLOUD NETWORKING, CLOUDNET, 2023, : 398 - 402
  • [23] An Attack Graph-based On-line Multi-step Attack Detector
    Angelini, Marco
    Bonomi, Silvia
    Borzi, Emanuele
    Del Pozzo, Antonella
    Lenti, Simone
    Santucci, Giuseppe
    ICDCN'18: PROCEEDINGS OF THE 19TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, 2018,
  • [24] A Key-Recovery Attack on 855-round Trivium
    Fu, Ximing
    Wang, Xiaoyun
    Dong, Xiaoyang
    Meier, Willi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 160 - 184
  • [25] Key Recovery Attack Against 2.5-Round π-Cipher
    Boura, Christina
    Chakraborti, Avik
    Leurent, Gaetan
    Paul, Goutam
    Saha, Dhiman
    Soleimany, Hadi
    Suder, Valentin
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 535 - 553
  • [26] Cascading Failure Model Considering Multi-Step Attack Strategy
    Guo, Hengdao
    Iu, Herbert Ho-Ching
    Fernando, Tyrone
    Zheng, Ciyan
    Zhang, Xi
    Tse, Chi K.
    2018 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS (ISCAS), 2018,
  • [27] A Privacy-Preserving Multi-step Attack Correlation Algorithm
    Xian, Minyi
    Zhang, Yongtang
    PROCEEDINGS OF 2016 IEEE ADVANCED INFORMATION MANAGEMENT, COMMUNICATES, ELECTRONIC AND AUTOMATION CONTROL CONFERENCE (IMCEC 2016), 2016, : 1389 - 1393
  • [28] Multi-Step Attack Pattern Detection on Normalized Event Logs
    Jaeger, David
    Ussath, Martin
    Cheng, Feng
    Meinel, Christoph
    2015 IEEE 2nd International Conference on Cyber Security and Cloud Computing (CSCloud), 2015, : 390 - 398
  • [29] A wireless multi-step attack pattern recognition method for WLAN
    Chen, Guanlin
    Zhang, Yujia
    Wang, Can
    EXPERT SYSTEMS WITH APPLICATIONS, 2014, 41 (16) : 7068 - 7076
  • [30] REDUCED MULTI-STEP ALGORITHMS FOR IDENTIFICATION OF LINEAR PLANTS
    SALYGA, VI
    RUDENKO, OG
    OBRUCHEV, VL
    PROBLEMS OF CONTROL AND INFORMATION THEORY-PROBLEMY UPRAVLENIYA I TEORII INFORMATSII, 1988, 17 (01): : 23 - 32