2022
DOI: 10.3390/cryptography6020030
|View full text |Cite
|
Sign up to set email alerts
|

ChaCha20–Poly1305 Authenticated Encryption with Additional Data for Transport Layer Security 1.3

Abstract: Transport Layer Security (TLS) provides a secure channel for end-to-end communications in computer networks. The ChaCha20–Poly1305 cipher suite is introduced in TLS 1.3, mitigating the sidechannel attacks in the cipher suites based on the Advanced Encryption Standard (AES). However, the few implementations cannot provide sufficient speed compared to other encryption standards with Authenticated Encryption with Associated Data (AEAD). This paper shows ChaCha20 and Poly1305 primitives. In addition, a compatible … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
8
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
7
2

Relationship

0
9

Authors

Journals

citations
Cited by 16 publications
(8 citation statements)
references
References 24 publications
(46 reference statements)
0
8
0
Order By: Relevance
“…To guarantee the authenticity of a communication, Poly1305 authenticators generate two tags, an authentication tag and a verification tag. The ChaCha20-Poly1305 [155] method has a longer nonce intervals and was developed for collision-free random number generation. The ChaCha20-Poly1305 algorithm has certain problems because of its susceptibility to spoofing attacks.…”
Section: Chacha20-poly1305mentioning
confidence: 99%
“…To guarantee the authenticity of a communication, Poly1305 authenticators generate two tags, an authentication tag and a verification tag. The ChaCha20-Poly1305 [155] method has a longer nonce intervals and was developed for collision-free random number generation. The ChaCha20-Poly1305 algorithm has certain problems because of its susceptibility to spoofing attacks.…”
Section: Chacha20-poly1305mentioning
confidence: 99%
“…From Table 1 , it could be deduced that the encryption times for Salsa20 and Chacha20 were proportional to the data sizes executed which resulted from the addictive, XORing, and constant distance rotation during execution [ 37 , 38 ]. ERSA encryption times also showed a proportional relationship between data size and encryption time [ 17 ].…”
Section: 0 Discussionmentioning
confidence: 99%
“…It adopts advanced encryption principles, such as constructing the encryption algorithm using a pseudo-random function, ensuring the algorithm's security. Moreover, ChaCha20 allows the use of different key lengths, such as 128 bits and 256 bits, with longer keys providing higher security strength that is difficult to crack through exhaustive methods [21].…”
Section: Security Analysismentioning
confidence: 99%