Cargando…
A new distinguishing attack on reduced round ChaCha permutation
This work concentrates on differential-linear distinguishing attacks on the prominent ARX-based permutation ChaCha. Here, we significantly improve the 7-round differential-linear distinguisher for ChaCha permutation by introducing a new path of linear approximation. We first introduce a new single-b...
Autores principales: | , |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
Nature Publishing Group UK
2023
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10460454/ https://www.ncbi.nlm.nih.gov/pubmed/37633980 http://dx.doi.org/10.1038/s41598-023-39849-1 |
_version_ | 1785097649432559616 |
---|---|
author | Dey, Chandan Sarkar, Santanu |
author_facet | Dey, Chandan Sarkar, Santanu |
author_sort | Dey, Chandan |
collection | PubMed |
description | This work concentrates on differential-linear distinguishing attacks on the prominent ARX-based permutation ChaCha. Here, we significantly improve the 7-round differential-linear distinguisher for ChaCha permutation by introducing a new path of linear approximation. We first introduce a new single-bit differential distinguisher for the 3.5th round of the permutation that assists us in inventing a new path for the differential-linear distinguisher. We show that one can distinguish a 7-round ChaCha permutation with time complexity of [Formula: see text] . This improves the recent work of Coutinho et al. (in: Advances in Cryptology—ASIACRYPT 2022—28nd International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2012, Springer, 2022), which achieved time complexity [Formula: see text] . We also propose a distinguisher for the 7.25-round of ChaCha permutation and this is the first distinguishing attack for more than 7-round of ChaCha permutation. We provide theoretical proofs and the corresponding experimental results for the linear approximations that we use for differential-linear distinguisher. We point out that the existing multibit distinguishing attacks on the cipher ChaCha are invalid. These attacks are worked only for the ChaCha permutation. |
format | Online Article Text |
id | pubmed-10460454 |
institution | National Center for Biotechnology Information |
language | English |
publishDate | 2023 |
publisher | Nature Publishing Group UK |
record_format | MEDLINE/PubMed |
spelling | pubmed-104604542023-08-28 A new distinguishing attack on reduced round ChaCha permutation Dey, Chandan Sarkar, Santanu Sci Rep Article This work concentrates on differential-linear distinguishing attacks on the prominent ARX-based permutation ChaCha. Here, we significantly improve the 7-round differential-linear distinguisher for ChaCha permutation by introducing a new path of linear approximation. We first introduce a new single-bit differential distinguisher for the 3.5th round of the permutation that assists us in inventing a new path for the differential-linear distinguisher. We show that one can distinguish a 7-round ChaCha permutation with time complexity of [Formula: see text] . This improves the recent work of Coutinho et al. (in: Advances in Cryptology—ASIACRYPT 2022—28nd International Conference on the Theory and Application of Cryptology and Information Security, Taipei, Taiwan, December 5–9, 2012, Springer, 2022), which achieved time complexity [Formula: see text] . We also propose a distinguisher for the 7.25-round of ChaCha permutation and this is the first distinguishing attack for more than 7-round of ChaCha permutation. We provide theoretical proofs and the corresponding experimental results for the linear approximations that we use for differential-linear distinguisher. We point out that the existing multibit distinguishing attacks on the cipher ChaCha are invalid. These attacks are worked only for the ChaCha permutation. Nature Publishing Group UK 2023-08-26 /pmc/articles/PMC10460454/ /pubmed/37633980 http://dx.doi.org/10.1038/s41598-023-39849-1 Text en © The Author(s) 2023 https://creativecommons.org/licenses/by/4.0/Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article’s Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article’s Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/ (https://creativecommons.org/licenses/by/4.0/) . |
spellingShingle | Article Dey, Chandan Sarkar, Santanu A new distinguishing attack on reduced round ChaCha permutation |
title | A new distinguishing attack on reduced round ChaCha permutation |
title_full | A new distinguishing attack on reduced round ChaCha permutation |
title_fullStr | A new distinguishing attack on reduced round ChaCha permutation |
title_full_unstemmed | A new distinguishing attack on reduced round ChaCha permutation |
title_short | A new distinguishing attack on reduced round ChaCha permutation |
title_sort | new distinguishing attack on reduced round chacha permutation |
topic | Article |
url | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC10460454/ https://www.ncbi.nlm.nih.gov/pubmed/37633980 http://dx.doi.org/10.1038/s41598-023-39849-1 |
work_keys_str_mv | AT deychandan anewdistinguishingattackonreducedroundchachapermutation AT sarkarsantanu anewdistinguishingattackonreducedroundchachapermutation AT deychandan newdistinguishingattackonreducedroundchachapermutation AT sarkarsantanu newdistinguishingattackonreducedroundchachapermutation |