Paper 2020/350

New Multi-bit Differentials to Improve Attacks Against ChaCha

Murilo Coutinho and T. C. Souza Neto

Abstract

The stream cipher ChaCha is an ARX type algorithm developed by Daniel Bernstein in 2008. Since its development, ChaCha has received a lot of attention and is currently being used in several systems. The most powerful cryptanalysis of reduced versions of this cipher was presented by Choudhuri and Maitra on FSE 2017 by using differential-linear cryptanalysis. In their work they show that is possible to obtain linear relations between bits from different rounds with high probability and use the proposed equations to create multi-bit differentials and improve previous attacks. In this work, we provide new linear approximations that can be used in a similar fashion but with increased efficiency. Therefore, we show that using these new equations is possible to improve the attacks against 6 and 7 rounds of ChaCha.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Preprint. MINOR revision.
Keywords
cryptanalysisstream ciphersChaChadifferential linear cryptanalysisprobabilistic neutral bits
Contact author(s)
murilo9988 @ gmail com
tsouzaneto @ gmail com
History
2020-03-26: received
Short URL
https://ia.cr/2020/350
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2020/350,
      author = {Murilo Coutinho and T.  C.  Souza Neto},
      title = {New Multi-bit Differentials to Improve Attacks Against ChaCha},
      howpublished = {Cryptology ePrint Archive, Paper 2020/350},
      year = {2020},
      note = {\url{https://eprint.iacr.org/2020/350}},
      url = {https://eprint.iacr.org/2020/350}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.