A multi-step key recovery attack on reduced round Salsa and ChaCha

被引:1
|
作者
Garai, Hirendra Kumar [1 ,3 ]
Dey, Sabyasachi [2 ]
机构
[1] BITS Pilani, Hyderabad Campus, Hyderabad, India
[2] Birla Inst Technol & Sci BITS, Pilani, India
[3] BITS Pilani, Math Dept, Hyderabad Campus, Hyderabad, India
关键词
ARX; ChaCha; differential cryptanalysis; key recovery attack; Salsa; CRYPTANALYSIS;
D O I
10.1080/01611194.2024.2342918
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper develops a significantly enhanced attack on the ciphers Salsa and ChaCha. The existing attacks against these ciphers are mainly differential attacks. In this work, we produce an attack on 7.5-round Salsa and 6.5-round ChaCha20. These are the maiden key-recovery attacks on those versions of the two ciphers, in which we recover the key in multiple steps using several distinguishers. In comparison to the previous best-known attack against 7-round Salsa, the new attack method offers an improvement of 27.5 times, while on 7.5-round Salsa20 and 6.5-round ChaCha20 our attack is the only existing one.
引用
收藏
页数:16
相关论文
共 50 条
  • [31] Key-Recovery Attack on Reduced-Round AES-128 Using the Exchange-Equivalence
    Zhang L.
    Wu W.
    Zhang L.
    Zheng Y.
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2021, 58 (10): : 2213 - 2221
  • [32] A Practical Key-Recovery Attack on 805-Round Trivium
    Ye, Chen-Dong
    Tian, Tian
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2021, PT I, 2021, 13090 : 187 - 213
  • [33] Privacy-preserving sequential step mining algorithm for multi-step attack correlation
    Shanghai Key Laboratory of Integrate Administration Technologies for Information Security, School of Information Security Engineering, Shanghai Jiaotong University, Shanghai 200240, China
    不详
    不详
    Qinghua Daxue Xuebao, 10 (1427-1434):
  • [34] Automated Key Recovery Attacks on Round-Reduced Orthros
    Li, Muzhou
    Sun, Ling
    Wang, Meiqin
    PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2022, 2022, 13503 : 189 - 213
  • [35] A Multi-Step Attack Pattern Discovery Method Based on Graph Mining
    Xu Jinghu
    Li Aiping
    Zhao Hui
    Yin Hong
    PROCEEDINGS OF 2012 2ND INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT 2012), 2012, : 376 - 380
  • [36] Security risk assessment based on bayesian multi-step attack graphs
    Yang, Yunxue
    Jin, Shuyuan
    Fang, Binxing
    Journal of Computational Information Systems, 2015, 11 (11): : 3911 - 3918
  • [37] An Unsupervised Two-Layer Multi-Step Network Attack Detector
    Wang, Su
    Wang, Zhiliang
    Yin, Xia
    Shi, Xingang
    IEEE INFOCOM 2020 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS WORKSHOPS (INFOCOM WKSHPS), 2020, : 1308 - 1309
  • [38] MAAC: Novel Alert Correlation Method To Detect Multi-step Attack
    Wang, Xiaoyu
    Gong, Xiaorui
    Yu, Lei
    Liu, Jian
    2021 IEEE 20TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2021), 2021, : 726 - 733
  • [39] Introducing a New Alert Data Set for Multi-Step Attack Analysis
    Landauer, Max
    Skopik, Florian
    Wurzenberger, Markus
    PROCEEDINGS OF 17TH CYBER SECURITY EXPERIMENTATION AND TEST WORKSHOP, CSET 2024, 2024, : 32 - 44
  • [40] REDUCED MULTI-STEP ALGORITHMS FOR IDENTIFICATION OF LINEAR PLANTS.
    Salyga, V.I.
    Rudenko, O.G.
    Obruchev, V.L.
    Problems of control and information theory, 1988, 17 (01): : 23 - 32