Rotational Cryptanalysis on ChaCha Stream Cipher

被引:2
|
作者
Barbero, Stefano [1 ]
Bazzanella, Danilo [1 ]
Bellini, Emanuele [2 ]
机构
[1] Politecn Torino, Dept Math Sci Giuseppe Luigi Lagrange, I-10129 Turin, Italy
[2] Technol Innovat Inst, Cryptog Res Ctr, POB 9639, Abu Dhabi, U Arab Emirates
来源
SYMMETRY-BASEL | 2022年 / 14卷 / 06期
关键词
ChaCha20; stream cipher; rotational cryptanalysis; rotational-XOR cryptanalysis; ATTACKS;
D O I
10.3390/sym14061087
中图分类号
O [数理科学和化学]; P [天文学、地球科学]; Q [生物科学]; N [自然科学总论];
学科分类号
07 ; 0710 ; 09 ;
摘要
In this paper we consider the ChaCha20 stream cipher in the related-key scenario and we study how to obtain rotational-XOR pairs with nonzero probability after the application of the first quarter round. The ChaCha20 input can be viewed as a 4x4 matrix of 32-bit words, where the first row of the matrix is fixed to a constant value, the second two rows represent the key, and the fourth some initialization values. Under some reasonable independence assumptions and a suitable selection of the input, we show that the aforementioned probability is about 2(-251.7857), a value greater than 2(-256), which is the one expected from a random permutation. We also investigate the existence of constants, different from the ones used in the first row of the ChaCha20 input, for which the rotational-XOR probability increases, representing a potential weakness in variants of the ChaCha20 stream cipher. So far, to our knowledge, this is the first analysis of the ChaCha20 stream cipher from a rotational-XOR perspective.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] PNB-Focused Differential Cryptanalysis of ChaCha Stream Cipher
    Miyashita, Shotaro
    Ito, Ryoma
    Miyaji, Atsuko
    INFORMATION SECURITY AND PRIVACY, ACISP 2022, 2022, 13494 : 46 - 66
  • [2] Higher-Order Differential-Linear Cryptanalysis of ChaCha Stream Cipher
    Ghafoori, Nasratullah
    Miyaji, Atsuko
    IEEE ACCESS, 2024, 12 : 13386 - 13399
  • [3] Vectorization on ChaCha Stream Cipher
    Goll, Martin
    Gueron, Shay
    2014 11TH INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY: NEW GENERATIONS (ITNG), 2014, : 612 - 615
  • [4] The Boomerang Attack on ChaCha Stream Cipher Permutation
    Ghafoori, Nasratullah
    Miyaji, Atsuko
    2024 6TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND THE INTERNET, ICCCI 2024, 2024, : 18 - 23
  • [5] Cryptanalysis of the stream cipher DECIM
    Wu, Hongjun
    Preneel, Bart
    FAST SOFTWARE ENCRYPTION, 2006, 4047 : 30 - 40
  • [6] Cryptanalysis of chaotic stream cipher
    Skrobek, Adrian
    PHYSICS LETTERS A, 2007, 363 (1-2) : 84 - 90
  • [7] Cryptanalysis of the GST stream cipher
    Lee, I
    Simmons, S
    Tavares, S
    CCECE 2003: CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-3, PROCEEDINGS: TOWARD A CARING AND HUMANE TECHNOLOGY, 2003, : 1789 - 1794
  • [8] Cryptanalysis of Loiss Stream Cipher
    Ding, Lin
    Guan, Jie
    COMPUTER JOURNAL, 2012, 55 (10): : 1192 - 1201
  • [9] Cryptanalysis of the Stream Cipher LEX
    Dunkelman, Orr
    Keller, Nathan
    DESIGNS CODES AND CRYPTOGRAPHY, 2013, 67 (03) : 357 - 373
  • [10] Cryptanalysis of 'Labyrinth' stream cipher
    Blackburn, SR
    Brincat, K
    Mirza, F
    Murphy, S
    ELECTRONICS LETTERS, 1998, 34 (12) : 1220 - 1221