Improved Related-Cipher Attack on Salsa20 Stream Cipher

被引:11
作者
Ding, Lin [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Dept Comp Sci & Engn, Shanghai 200000, Peoples R China
[2] Zhengzhou Informat Sci & Technol Inst, Zhengzhou 450000, Henan, Peoples R China
基金
中国国家自然科学基金;
关键词
Cryptanalasis; related-cipher attack; Salsa20; stream cipher; CHACHA;
D O I
10.1109/ACCESS.2019.2892647
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Salsa20 stream cipher was designed by Bernstein in 2005 as a candidate for eSTREAM and Salsa20/12 was accepted in the eSTREAM software portfolio in 2008. In this paper, we present an improved related-cipher attack on Salsa20. If a secret key is used in Salsa20/12 and Salsa20/8 with 2 different IVs, we can recover the 256-bit secret key with time complexity of about 2(193.58), which improves the existing attack by a factor of 2(30.42). To the best of our knowledge, this is the best related-cipher attack on Salsa20 so far. Furthermore, we build a binary integer optimization model to search for the best related-cipher attack on Salsa20. The results show that our attack is the best related-cipher attack on Salsa20 in this model.
引用
收藏
页码:30197 / 30202
页数:6
相关论文
共 18 条
[1]  
[Anonymous], 2006, STAT ART STREAM CIP
[2]  
Aumasson JP, 2008, LECT NOTES COMPUT SC, V5086, P470
[3]  
Bernstein D. J., 2006, 2006007 ESTREAM ECRY
[4]  
Bernstein D. J., 2005, 2005066 ESTREAM ECRY
[5]  
Bernstein D. J., 2005, P WORKSH REC SYMM KE
[6]  
Biryukov A, 1999, LECT NOTES COMPUT SC, V1636, P245
[7]  
Deepthi K.K.C., 2017, INT C MOB NETW MAN, P324
[8]   Improved analysis for reduced round Salsa and Chacha [J].
Dey, Sabyasachi ;
Sarkar, Santanu .
DISCRETE APPLIED MATHEMATICS, 2017, 227 :58-69
[9]  
Fischer S, 2006, LECT NOTES COMPUT SC, V4329, P2
[10]  
Hernandez-Castro JC, 2008, LECT NOTES COMPUT SC, V5086, P462