Enhancing the Key Recovery Attack on Round Reduced Salsa

被引:0
|
作者
Dey, Chandan [1 ]
Dey, Sabyasachi [2 ]
Girme, Rahul [1 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Inst Technol Madras, Dept Math, Chennai 600036, India
[2] Birla Inst Technol & Sci, Dept Math, Hyderabad Campus, Hyderabad 500078, India
关键词
Ciphers; Probabilistic logic; Security; Complexity theory; Time complexity; Solid modeling; Privacy; Neural network hardware; Cryptography; Differential cryptanalysis; PNBs; stream cipher; Salsa; CRYPTANALYSIS; CHACHA;
D O I
10.1109/ACCESS.2024.3367797
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Salsa is the most well-known stream cipher and a finalist of the eSTREAM project. The concept of probabilistic neutral bits (PNBs) first presented by Aumasson et al., is the most important step in the cryptanalysis of Salsa. In this paper, we provide a strategy to find a better set of PNBs and we improve the existing attacks. Our attack complexity is 2(210.38), which is an improvement of the latest work at ASIACRYPT 2022. We also revisit the work of Ghafoori et al. (ISPEC 2022). In their study, they used a PNB-based differential attack to present a key recovery attack on Salsa20/8 with a time complexity of 2(144.75). They claimed their approach was the most effective single -bit differential attack to date. Our paper challenges this claim, providing experimental results and reasoned arguments to support our case.
引用
收藏
页码:31736 / 31744
页数:9
相关论文
共 50 条
  • [41] Improved key-recovery attacks on reduced-round WEM-8
    Liu, Jun
    Wang, Dachao
    Hu, Yupu
    Chen, Jie
    Wang, Baocang
    DESIGNS CODES AND CRYPTOGRAPHY, 2022, 90 (10) : 2419 - 2448
  • [42] Improved key-recovery attacks on reduced-round WEM-8
    Jun Liu
    Dachao Wang
    Yupu Hu
    Jie Chen
    Baocang Wang
    Designs, Codes and Cryptography, 2022, 90 : 2419 - 2448
  • [43] Truncated Differential-Neural Key Recovery Attacks on Round-Reduced HIGHT
    Seok, Byoungjin
    ELECTRONICS, 2024, 13 (20)
  • [44] Significantly Improved Multi-bit Differentials for Reduced Round Salsa and ChaCha
    Choudhuri, Arka Rai
    Maitra, Subhamoy
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2016, 2016 (02) : 261 - 287
  • [45] Improved Linear Hull Attack on Round-Reduced SIMON with Dynamic Key-Guessing Techniques
    Chen, Huaifeng
    Wang, Xiaoyun
    FAST SOFTWARE ENCRYPTION (FSE 2016), 2016, 9783 : 428 - 449
  • [46] A Low-Complexity Key-Recovery Attack on 6-Round Midori64
    Xie, Xiaofeng
    Tian, Tian
    JOURNAL OF SYSTEMS SCIENCE & COMPLEXITY, 2023, 36 (04) : 1738 - 1756
  • [47] A Low-Complexity Key-Recovery Attack on 6-Round Midori64
    Xiaofeng Xie
    Tian Tian
    Journal of Systems Science and Complexity, 2023, 36 : 1738 - 1756
  • [48] A Low-Complexity Key-Recovery Attack on 6-Round Midori64
    XIE Xiaofeng
    TIAN Tian
    Journal of Systems Science & Complexity, 2023, 36 (04) : 1738 - 1756
  • [49] Improved Key Recovery Attacks on Reduced-Round AES with Practical Data and Memory Complexities
    Bar-On, Achiya
    Dunkelman, Orr
    Keller, Nathan
    Ronen, Eyal
    Shamir, Adi
    ADVANCES IN CRYPTOLOGY - CRYPTO 2018, PT II, 2018, 10992 : 185 - 212
  • [50] Cube Testers and Key Recovery Attacks on Reduced-Round MD6 and Trivium
    Aumasson, Jean-Philippe
    Dinur, Itai
    Meier, Willi
    Shamir, Adi
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 1 - +