Enhancing the Key Recovery Attack on Round Reduced Salsa

被引:0
|
作者
Dey, Chandan [1 ]
Dey, Sabyasachi [2 ]
Girme, Rahul [1 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Inst Technol Madras, Dept Math, Chennai 600036, India
[2] Birla Inst Technol & Sci, Dept Math, Hyderabad Campus, Hyderabad 500078, India
关键词
Ciphers; Probabilistic logic; Security; Complexity theory; Time complexity; Solid modeling; Privacy; Neural network hardware; Cryptography; Differential cryptanalysis; PNBs; stream cipher; Salsa; CRYPTANALYSIS; CHACHA;
D O I
10.1109/ACCESS.2024.3367797
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Salsa is the most well-known stream cipher and a finalist of the eSTREAM project. The concept of probabilistic neutral bits (PNBs) first presented by Aumasson et al., is the most important step in the cryptanalysis of Salsa. In this paper, we provide a strategy to find a better set of PNBs and we improve the existing attacks. Our attack complexity is 2(210.38), which is an improvement of the latest work at ASIACRYPT 2022. We also revisit the work of Ghafoori et al. (ISPEC 2022). In their study, they used a PNB-based differential attack to present a key recovery attack on Salsa20/8 with a time complexity of 2(144.75). They claimed their approach was the most effective single -bit differential attack to date. Our paper challenges this claim, providing experimental results and reasoned arguments to support our case.
引用
收藏
页码:31736 / 31744
页数:9
相关论文
共 50 条
  • [31] The Square Attack of Reduced-Round Camellia
    Yu, Xiaoli
    Wei, Hongru
    NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 2, PROCEEDINGS, 2009, : 244 - 247
  • [32] Collision attack on reduced-round Camellia
    Wu, WL
    Feng, DG
    SCIENCE IN CHINA SERIES F-INFORMATION SCIENCES, 2005, 48 (01): : 78 - 90
  • [33] Improved collision attack on reduced round Camellia
    Guan Jie
    Zhang Zhongya
    CRYPTOLOGY AND NETWORK SECURITY, PROCEEDINGS, 2006, 4301 : 182 - +
  • [34] Cube Attack on Reduced-Round Quavium
    Zhang, Shiyong
    Chen, Gongliang
    Li, Jianhua
    PROCEEDINGS OF THE 3RD INTERNATIONAL CONFERENCE ON MECHATRONICS AND INDUSTRIAL INFORMATICS, 2015, 31 : 135 - 139
  • [35] A Cube Attack on a Reduced-Round Sycon
    Cho, Minjeong
    Eom, Hyejin
    Tcydenova, Erzhena
    Lee, Changhoon
    ELECTRONICS, 2022, 11 (21)
  • [36] A Meet in the Middle Attack on Reduced Round Kuznyechik
    Altawy, Riham
    Youssef, Amr M.
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (10) : 2194 - 2198
  • [37] Integral Attack on Reduced-Round RECTANGLE
    Kosuge, Haruhisa
    Tanaka, Hidema
    Iwai, Keisuke
    Kurokawa, Takakazu
    2015 IEEE 2ND INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (CSCLOUD), 2015, : 68 - 73
  • [38] Collision attack on reduced-round Camellia
    Wenling Wu
    Dengguo Feng
    Science in China Series F: Information Sciences, 2005, 48 : 78 - 90
  • [39] Collision attack on reduced-round Camellia
    WU Wenling & FENG Dengguo State Key Laboratory of Information Security
    Science in China(Series F:Information Sciences), 2005, (01) : 78 - 90
  • [40] Structural Attack on Reduced-Round Skipjack
    Zhang, Jiyan
    Cui, Ting
    Jin, Chenhui
    IEEE ACCESS, 2018, 6 : 3176 - 3183