Author:
Dey Chandan,Sarkar Santanu
Abstract
AbstractThis work concentrates on differential-linear distinguishing attacks on the prominent ARX-based permutation ChaCha. Here, we significantly improve the 7-round differential-linear distinguisher for ChaCha permutation by introducing a new path of linear approximation. We first introduce a new single-bit differential distinguisher for the 3.5th round of the permutation that assists us in inventing a new path for the differential-linear distinguisher. We show that one can distinguish a 7-round ChaCha permutation with time complexity of $$2^{207}$$
2
207
. This improves the recent work of Coutinho et al. (in: Advances in Cryptology—ASIACRYPT 2022—28nd International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2012, Springer, 2022), which achieved time complexity $$2^{214}$$
2
214
. We also propose a distinguisher for the 7.25-round of ChaCha permutation and this is the first distinguishing attack for more than 7-round of ChaCha permutation. We provide theoretical proofs and the corresponding experimental results for the linear approximations that we use for differential-linear distinguisher. We point out that the existing multibit distinguishing attacks on the cipher ChaCha are invalid. These attacks are worked only for the ChaCha permutation.
Publisher
Springer Science and Business Media LLC
Reference32 articles.
1. Beaulieu, R. et al. The SIMON and SPECK families of lightweight block ciphers. In Cryptology ePrint Archive, Paper 2013/404. https://eprint.iacr.org/2013/404 (2013).
2. Dinu, D. et al. Design strategies for ARX with provable bounds: Sparx and LAX. In Advances in Cryptology—ASIACRYPT 2016—22nd International Conference on the Theory and Application of Cryptology and Information Security, Hanoi, Vietnam, December 4–8, 2016, Proceedings, Part I, Volume 10031 of Lecture Notes in Computer Science (eds Cheon, J. H. & Takagi, T.) 484–513 (2016).
3. Bernstein, D. J. Salsa20 Specification. http://www.ecrypt.eu.org/stream/salsa20pf.html (2005).
4. Bernstein, D. J. ChaCha, a Variant of Salsa20. http://cr.yp.to/chacha.html (2008).
5. Mouha, N. et al. Chaskey: An efficient MAC algorithm for 32-bit microcontrollers. In Selected Areas in Cryptography—SAC 2014—21st International Conference, Montreal, QC, Canada, August 14–15, 2014, Revised Selected Papers, Volume 8781 of Lecture Notes in Computer Science (Joux, A. & Youssef, A. M.) 306–323 (Springer, 2014).
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献