DOI: 10.1007/978-3-540-71039-4_30
|View full text |Cite
|
Sign up to set email alerts
|

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba

Abstract: Abstract. The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a variant of Salsa20 aiming at bringing better diffusion for similar performance. Variants of Salsa20 with up to 7 rounds (instead of 20) have been broken by differential cryptanalysis, while ChaCha has not been analyzed yet. We introduce a novel method for differential cryptanalysis of Salsa20 and ChaCha, inspired by correlation … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

5
158
0
3

Publication Types

Select...
9

Relationship

2
7

Authors

Journals

citations
Cited by 102 publications
(166 citation statements)
references
References 9 publications
(16 reference statements)
5
158
0
3
Order By: Relevance
“…We introduce the dependency tables to distinguish the influential bits, from those which have no influence or are less influential. In other words, in case the condition function does not mix its input bits well, we profit not only from neutral bits [7] but also from probabilistic neutral bits [2]. This is achieved by devising a backtracking search algorithm, similar to [6,14,24], based on the dependency table.…”
Section: Finding a Conforming Message Pair Efficientlymentioning
confidence: 99%
See 1 more Smart Citation
“…We introduce the dependency tables to distinguish the influential bits, from those which have no influence or are less influential. In other words, in case the condition function does not mix its input bits well, we profit not only from neutral bits [7] but also from probabilistic neutral bits [2]. This is achieved by devising a backtracking search algorithm, similar to [6,14,24], based on the dependency table.…”
Section: Finding a Conforming Message Pair Efficientlymentioning
confidence: 99%
“…We then define the concept of dependency table which shows how much influence every input bit of the condition function has on each output bit. By carefully analyzing the dependency table, we are able to profit not only from neutral bits [7] but also from probabilistic neutral bits [2] in a backtracking search algorithm, similar to [6,14,24]. This contributes to a better understanding of freedom degrees uses.…”
Section: Introductionmentioning
confidence: 99%
“…In this section we review the framework from [7] which was inspired by results from [1,5,11]. Let F : B m ×B n → B be a keyed Boolean function which maps the m-bit public variable C and the n-bit secret variable K into the output bit z = F (C, K).…”
Section: An Approach For Key Recovery On a Keyed Functionmentioning
confidence: 99%
“…Later a four round differential was exploited by Fischer et al [6] to break 6 rounds in 2 177 trials and by Tsnunoo et al [11] to break 7 rounds in about 2 190 trials. The currently best attack by Aumasson et al [1] covers 8 round version of Salsa20 with estimated complexity of 2 251 .…”
Section: Introductionmentioning
confidence: 99%