Paper 2023/134
Cryptanalysis of Reduced Round ChaCha- New Attack and Deeper Analysis
Abstract
In this paper we present several analyses on ChaCha, a software stream cipher. First, we consider a divide-and-conquer approach on the secret key bits by partitioning them. The partitions are based on multiple input-output differentials to obtain a significantly improved attack on 6-round ChaCha256 with a complexity of 2^{99.48}. It is 2^{40} times faster than the currently best known attack. Note that, this is the first time an attack could be mounted on reduced round ChaCha with a complexity significantly less than 2^{k}{2}, where the secret key is of
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Published by the IACR in TOSC 2023
- Keywords
- Stream cipherARXChaChaProbabilistic Neutral Bits (PNBs)Differential attack
- Contact author(s)
-
sabya ndp @ gmail com
p20190465 @ hyderabad bits-pilani ac in
maitra subhamoy @ gmail com - History
- 2023-02-09: revised
- 2023-02-05: received
- See all versions
- Short URL
- https://ia.cr/2023/134
- License
-
CC0
BibTeX
@misc{cryptoeprint:2023/134, author = {Sabyasachi Dey and Hirendra Kumar Garai and Subhamoy Maitra}, title = {Cryptanalysis of Reduced Round {ChaCha}- New Attack and Deeper Analysis}, howpublished = {Cryptology {ePrint} Archive, Paper 2023/134}, year = {2023}, url = {https://eprint.iacr.org/2023/134} }