Paper 2025/206
Revisiting the Differential-Linear Attacks on ChaCha from IEEE TIT and INDOCRYPT 2024 (Extended Abstract)
Abstract
The ChaCha stream cipher has become one of the best known ARX-based ciphers because of its widely use in several systems, such as in TLS, SSH and so on. In this paper, we find some errors in the attacks on ChaCha256 from IEEE TIT and INDOCRYPT 2024, and then corrected cryptanalytic attacks on ChaCha256 are given. However, the corrected attacks have extremely large time and data complexities. The corrected results show that the technique proposed in IEEE TIT may not be able to obtain improved differential-linear attacks on ChaCha.
Metadata
- Available format(s)
-
PDF
- Category
- Attacks and cryptanalysis
- Publication info
- Preprint.
- Keywords
- Cryptanalysisdifferential-linear attackChaChastream cipher
- Contact author(s)
- dinglin_cipher @ 163 com
- History
- 2025-02-12: approved
- 2025-02-11: received
- See all versions
- Short URL
- https://ia.cr/2025/206
- License
-
CC BY-NC
BibTeX
@misc{cryptoeprint:2025/206, author = {Xinhai Wang and Lin Ding and Zhengting Li and Jiang Wan and Bin Hu}, title = {Revisiting the Differential-Linear Attacks on {ChaCha} from {IEEE} {TIT} and {INDOCRYPT} 2024 (Extended Abstract)}, howpublished = {Cryptology {ePrint} Archive, Paper 2025/206}, year = {2025}, url = {https://eprint.iacr.org/2025/206} }