Paper 2018/1127
Freestyle, a randomized version of ChaCha for resisting offline brute-force and dictionary attacks
P. Arun Babu and Jithin Jose Thomas
Abstract
This paper introduces Freestyle, a randomized, and variable round version of the ChaCha cipher. Freestyle demonstrates the concept of hash based halting condition, where a decryption attempt with an incorrect key is likely to take longer time to halt. This makes it resistant to key-guessing attacks i.e. brute-force and dictionary based attacks. Freestyle uses a novel approach for ciphertext randomization by using random number of rounds for each block of message, where the exact number of rounds are unknown to the receiver in advance. Due to its inherent random behavior, Freestyle provides the possibility of generating up to
Metadata
- Available format(s)
-
PDF
- Category
- Secret-key cryptography
- Publication info
- Preprint.
- Keywords
- Brute-force resistant ciphersDictionary based attacksKey-guessing penaltyProbabilistic encryptionFreestyleChaCha
- Contact author(s)
- arun hbni @ gmail com
- History
- 2018-11-29: received
- Short URL
- https://ia.cr/2018/1127
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2018/1127, author = {P. Arun Babu and Jithin Jose Thomas}, title = {Freestyle, a randomized version of {ChaCha} for resisting offline brute-force and dictionary attacks}, howpublished = {Cryptology {ePrint} Archive, Paper 2018/1127}, year = {2018}, url = {https://eprint.iacr.org/2018/1127} }