Paper 2025/206

Revisiting the Differential-Linear Attacks on ChaCha from IEEE TIT and INDOCRYPT 2024 (Extended Abstract)

Xinhai Wang, Information Engineering University
Lin Ding, Information Engineering University
Zhengting Li, Information Engineering University
Jiang Wan, Information Engineering University
Bin Hu, Information Engineering University
Abstract

The ChaCha stream cipher has become one of the best known ARX-based ciphers because of its widely use in several systems, such as in TLS, SSH and so on. In this paper, we find some errors in the attacks on ChaCha256 from IEEE TIT and INDOCRYPT 2024, and then corrected cryptanalytic attacks on ChaCha256 are given. However, the corrected attacks have extremely large time and data complexities. The corrected results show that the technique proposed in IEEE TIT may not be able to obtain improved differential-linear attacks on ChaCha.

Metadata
Available format(s)
PDF
Category
Attacks and cryptanalysis
Publication info
Preprint.
Keywords
Cryptanalysisdifferential-linear attackChaChastream cipher
Contact author(s)
dinglin_cipher @ 163 com
History
2025-02-12: approved
2025-02-11: received
See all versions
Short URL
https://ia.cr/2025/206
License
Creative Commons Attribution-NonCommercial
CC BY-NC

BibTeX

@misc{cryptoeprint:2025/206,
      author = {Xinhai Wang and Lin Ding and Zhengting Li and Jiang Wan and Bin Hu},
      title = {Revisiting the Differential-Linear Attacks on {ChaCha} from {IEEE} {TIT} and {INDOCRYPT} 2024 (Extended Abstract)},
      howpublished = {Cryptology {ePrint} Archive, Paper 2025/206},
      year = {2025},
      url = {https://eprint.iacr.org/2025/206}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.