Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha
The stream cipher ChaCha has been subjected to differential linear cryptanalysis since 2008. Aumasson et al. (2008) laid the groundwork for this attack, employing the concept of probabilistically neutral bits for key recovery. Subsequently, various enhancements have been made to this attack over the...
Saved in:
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2024-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/10458141/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1841536169802727424 |
---|---|
author | Nitin Kumar Sharma Sabyasachi Dey |
author_facet | Nitin Kumar Sharma Sabyasachi Dey |
author_sort | Nitin Kumar Sharma |
collection | DOAJ |
description | The stream cipher ChaCha has been subjected to differential linear cryptanalysis since 2008. Aumasson et al. (2008) laid the groundwork for this attack, employing the concept of probabilistically neutral bits for key recovery. Subsequently, various enhancements have been made to this attack over the last few decades. These improvements are essentially refinements to the probabilistically neutral bit-based attack approach. Despite the proposed modifications in these improvements, which increase attack complexity, the consequential changes in the associated probability of key recovery have not been thoroughly examined. A comprehensive analysis of the probability of key recovery is lacking in all attacks within this domain. No systematic process is available in the existing works for analyzing the probability of key recovery. This paper addresses this gap by proposing a method for estimating the probability of key recovery in these attacks. Employing this method, we calculate an estimated interval for the probability of key recovery for both the original idea presented by Aumasson et al. (2008) and the subsequent modifications to this idea. This analysis allows us to understand the variations in probability associated with these modifications. |
format | Article |
id | doaj-art-4802d600867d40c8869b462ccde9d2fa |
institution | Kabale University |
issn | 2169-3536 |
language | English |
publishDate | 2024-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj-art-4802d600867d40c8869b462ccde9d2fa2025-01-15T00:01:16ZengIEEEIEEE Access2169-35362024-01-0112370003701110.1109/ACCESS.2024.337285710458141Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaChaNitin Kumar Sharma0https://orcid.org/0000-0003-1009-7697Sabyasachi Dey1https://orcid.org/0000-0002-9984-4646Department of Mathematics, Birla Institute of Technology and Science Pilani, Hyderabad Campus, Hyderabad, IndiaDepartment of Mathematics, Birla Institute of Technology and Science Pilani, Hyderabad Campus, Hyderabad, IndiaThe stream cipher ChaCha has been subjected to differential linear cryptanalysis since 2008. Aumasson et al. (2008) laid the groundwork for this attack, employing the concept of probabilistically neutral bits for key recovery. Subsequently, various enhancements have been made to this attack over the last few decades. These improvements are essentially refinements to the probabilistically neutral bit-based attack approach. Despite the proposed modifications in these improvements, which increase attack complexity, the consequential changes in the associated probability of key recovery have not been thoroughly examined. A comprehensive analysis of the probability of key recovery is lacking in all attacks within this domain. No systematic process is available in the existing works for analyzing the probability of key recovery. This paper addresses this gap by proposing a method for estimating the probability of key recovery in these attacks. Employing this method, we calculate an estimated interval for the probability of key recovery for both the original idea presented by Aumasson et al. (2008) and the subsequent modifications to this idea. This analysis allows us to understand the variations in probability associated with these modifications.https://ieeexplore.ieee.org/document/10458141/Probability of key recoveryChaCharight pair-based attackerror probability |
spellingShingle | Nitin Kumar Sharma Sabyasachi Dey Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha IEEE Access Probability of key recovery ChaCha right pair-based attack error probability |
title | Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha |
title_full | Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha |
title_fullStr | Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha |
title_full_unstemmed | Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha |
title_short | Analyzing the Probability of Key Recovery in the Differential Attacks Against ChaCha |
title_sort | analyzing the probability of key recovery in the differential attacks against chacha |
topic | Probability of key recovery ChaCha right pair-based attack error probability |
url | https://ieeexplore.ieee.org/document/10458141/ |
work_keys_str_mv | AT nitinkumarsharma analyzingtheprobabilityofkeyrecoveryinthedifferentialattacksagainstchacha AT sabyasachidey analyzingtheprobabilityofkeyrecoveryinthedifferentialattacksagainstchacha |