Truncated differential cryptanalysis of five rounds of Salsa20

نویسنده

  • Paul Crowley
چکیده

We present an attack on Salsa20 reduced to five of its twenty rounds. This attack uses many clusters of truncated differentials and requires 2 work and 2 plaintexts. 1 Definition of Salsa20 Salsa20 [1] is a candidate in the eSTREAM project to identify new stream ciphers that might be suitable for widespread adoption. For convenience, we recap here the parameterized family of variants Salsa20-w/r, with w the word size and r the number of rounds; Salsa20 itself is Salsa20-32/20. A word is an element of Z/2wZ. We omit the precise definitions of word-oriented operations here for brevity; addition (+), XOR (⊕) and rotation (≪) are defined in the usual way, and where words are mapped to bytes, a little-endian mapping is used. We define a bijective map S on four-element column vectors of words: Sa(( y0 y1 y2 y3 ) ) = ( y1 ⊕ ((y0 + y3) ≪ a) y2 y3 y0 ) and compose it four times to build this bijective map on the same: Q = S18 ◦ S13 ◦ S9 ◦ S7 (note that the constants given in the subscripts are appropriate for w = 32; different constants might be used for a different w) and compose it with a row and column rotate to get this bijective map on matrices: Q′(m) =  m1,1 m1,2 m1,3 q1 m2,1 m2,2 m2,3 q2 m3,1 m3,2 m3,3 q3 m0,1 m0,2 m0,3 q0  ∗[email protected]. Work sponsored by LShift Ltd, www.lshift.net

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Proof that the ARX Cipher Salsa20 is Secure against Differential Cryptanalysis

An increasing number of cryptographic primitives are built using the ARX operations: addition modulo 2n, bit rotation and XOR. Because of their very fast performance in software, ARX ciphers are becoming increasingly common. However, not a single ARX cipher has yet been proven to be secure against one of the most common attacks in symmetrickey cryptography: differential cryptanalysis. In this p...

متن کامل

New Features of Latin Dances: Analysis of Salsa, ChaCha, and Rumba

The stream cipher Salsa20 was introduced by Bernstein in 2005 as a candidate in the eSTREAM project, accompanied by the reduced versions Salsa20/8 and Salsa20/12. ChaCha is a variant of Salsa20 aiming at bringing better diffusion for similar performance. Variants of Salsa20 with up to 7 rounds (instead of 20) have been broken by differential cryptanalysis, while ChaCha has not been analyzed yet...

متن کامل

Impossible Differential Cryptanalysis on Deoxys-BC-256

Deoxys is a final-round candidate of the CAESAR competition. Deoxys is built upon an internal tweakable block cipher Deoxys-BC, where in addition to the plaintext and key, it takes an extra non-secret input called a tweak. This paper presents the first impossible differential cryptanalysis of Deoxys-BC-256 which is used in Deoxys as an internal tweakable block cipher. First, we find a 4.5-round...

متن کامل

Quantum impossible differential and truncated differential cryptanalysis

We study applications of BV algorithm and present quantum versions of impossible differential cryptanalysis and truncated differential cryptanalysis based on it. Afterwards, we analyze their efficiencies and success probabilities rigorously. In traditional impossible differential attack or truncated differential attack, it is difficult to extend the differential path, which usually limits the n...

متن کامل

Differential Cryptanalysis of Salsa20/8

This paper presents a cryptanalysis of the Salsa20 stream cipher proposed in 2005. Salsa20 was submitted to eSTREAM, the ECRYPT Stream Cipher Project. The cipher uses bitwise XOR, addition modulo 2, and constant-distance rotation operations on an internal state of 16 32-bit words. It is reported that there is a significant bias in the differential probability for Salsa20’s 4 round internal stat...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005