A multi-step key recovery attack on reduced round Salsa and ChaCha

被引:1
|
作者
Garai, Hirendra Kumar [1 ,3 ]
Dey, Sabyasachi [2 ]
机构
[1] BITS Pilani, Hyderabad Campus, Hyderabad, India
[2] Birla Inst Technol & Sci BITS, Pilani, India
[3] BITS Pilani, Math Dept, Hyderabad Campus, Hyderabad, India
关键词
ARX; ChaCha; differential cryptanalysis; key recovery attack; Salsa; CRYPTANALYSIS;
D O I
10.1080/01611194.2024.2342918
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
This paper develops a significantly enhanced attack on the ciphers Salsa and ChaCha. The existing attacks against these ciphers are mainly differential attacks. In this work, we produce an attack on 7.5-round Salsa and 6.5-round ChaCha20. These are the maiden key-recovery attacks on those versions of the two ciphers, in which we recover the key in multiple steps using several distinguishers. In comparison to the previous best-known attack against 7-round Salsa, the new attack method offers an improvement of 27.5 times, while on 7.5-round Salsa20 and 6.5-round ChaCha20 our attack is the only existing one.
引用
收藏
页数:16
相关论文
共 50 条
  • [41] A multi-step attack identification and correlation method based on multi-information fusion
    Liao, Niandong
    Wang, Jiaxun
    Guan, Jiayu
    Fan, Hejun
    COMPUTERS & ELECTRICAL ENGINEERING, 2024, 117
  • [42] PLANNING MULTI-STEP ERROR-DETECTION AND RECOVERY STRATEGIES
    DONALD, BR
    INTERNATIONAL JOURNAL OF ROBOTICS RESEARCH, 1990, 9 (01): : 3 - 60
  • [43] A multi-step peptidolytic cascade for amino acid recovery in chloroplasts
    Teixeira, Pedro F.
    Kmiec, Beata
    Branca, Rui M. M.
    Murcha, Monika W.
    Byzia, Anna
    Ivanova, Aneta
    Whelan, James
    Drag, Marcin
    Lehtio, Janne
    Glaser, Elzbieta
    NATURE CHEMICAL BIOLOGY, 2017, 13 (01) : 15 - 17
  • [44] A multi-step peptidolytic cascade for amino acid recovery in chloroplasts
    Teixeira P.F.
    Kmiec B.
    Branca R.M.M.
    Murcha M.W.
    Byzia A.
    Ivanova A.
    Whelan J.
    Drag M.
    Lehtiö J.
    Glaser E.
    Nature Chemical Biology, 2017, 13 (1) : 15 - 17
  • [45] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Long Wen
    Mei-Qin Wang
    Jing-Yuan Zhao
    Journal of Computer Science and Technology, 2014, 29 : 165 - 176
  • [46] Related-Key Impossible Differential Attack on Reduced-Round LBlock
    Wen, Long
    Wang, Mei-Qin
    Zhao, Jing-Yuan
    JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY, 2014, 29 (01) : 165 - 176
  • [47] Related-Key Impossible Diferential Attack on Reduced-Round LBlock
    温隆
    王美琴
    赵静远
    JournalofComputerScience&Technology, 2014, 29 (01) : 165 - 176
  • [48] MIF: A multi-step attack scenario reconstruction and attack chains extraction method based on multi-information fusion
    Mao, Beifeng
    Liu, Jing
    Lai, Yingxu
    Sun, Motong
    COMPUTER NETWORKS, 2021, 198
  • [49] Algebraic Key-Recovery Attacks on Reduced-Round Xoofff
    Cui, Tingting
    Grassi, Lorenzo
    SELECTED AREAS IN CRYPTOGRAPHY, 2021, 12804 : 171 - 197
  • [50] A cluster-based practical key recovery attack on reduced-round AES using impossible-differential cryptanalysis
    Pal, Debranjan
    Ali, Md Rasid
    Das, Abhijit
    Chowdhury, Dipanwita Roy
    JOURNAL OF SUPERCOMPUTING, 2023, 79 (06): : 6252 - 6289