Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function

IF 3.4 3区 计算机科学 Q2 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Access Pub Date : 2023-10-13 DOI:10.1109/ACCESS.2023.3324612
Victor R. Kebande
{"title":"Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function","authors":"Victor R. Kebande","doi":"10.1109/ACCESS.2023.3324612","DOIUrl":null,"url":null,"abstract":"Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance against cryptanalysis. Although the existing literature highlights its strengths, it is worth further exploring its potential susceptibility to differential attacks. This paper proposes an Extended Chacha20 (EChacha20) stream cipher, which offers a slight improvement of Chacha20. It incorporates enhanced Quarter Round Functions \n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\n with 32-bit input words and \n<inline-formula> <tex-math>$Add $ </tex-math></inline-formula>\n, \n<inline-formula> <tex-math>$Rotate $ </tex-math></inline-formula>\n, and \n<inline-formula> <tex-math>$XOR (ARX)$ </tex-math></inline-formula>\n operations on 16, 12, 8, 7, 4, and 2 constants. Using these improved \n<inline-formula> <tex-math>$QR-Fs$ </tex-math></inline-formula>\n, we expect EChacha20 to be more secure and effective against attacks than Chacha20. The threat model leveraged in this paper considers attacker assumptions based on the Bellare-Rogaway Model (B-RM) and the Chosen Plaintext Attack (CPA) to assess the potential security weaknesses. Then, the study analyzes the EChacha20 cipher using the NIST Statistical Test Suite (NSTS) and demonstrates its effectiveness against differential cryptanalysis. A differential attack addresses this challenge, where the study comprehensively analyses the differences between original and flipped bits. The NSTS has been used to statistically analyze the outcome for uniformity and evaluate the randomness of generating sequences of tests considering 1000 tests based on a range of \n<inline-formula> <tex-math>$[{0,1}]$ </tex-math></inline-formula>\n. Uniformity is evaluated based on the \n<inline-formula> <tex-math>$p-values$ </tex-math></inline-formula>\n test against a battery of passing sequences, and 100% is achieved from \n<inline-formula> <tex-math>$Runs$ </tex-math></inline-formula>\n and \n<inline-formula> <tex-math>$Serial (2): Test 1$ </tex-math></inline-formula>\n, respectively. The performance evaluation metrics leveraged include encryption speed, decryption speed, and memory usage. Based on the test conducted, it has been observed that with increased \n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\n, EChacha20 maintains a good balance in speed although slightly higher than Chacha20; however, with also slightly high memory usage compared to Chacha20. Despite that, a comparative study has been conducted against state-of-the-art studies, and the outcome has been reported to show the significance of the current study. Ultimately, the outcome indicates that the EChacha20 cipher has improved \n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\n and security properties compared to Chacha20 and may provide a more robust encryption solution for various applications.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"114220-114237"},"PeriodicalIF":3.4000,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285091.pdf","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Access","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10285091/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance against cryptanalysis. Although the existing literature highlights its strengths, it is worth further exploring its potential susceptibility to differential attacks. This paper proposes an Extended Chacha20 (EChacha20) stream cipher, which offers a slight improvement of Chacha20. It incorporates enhanced Quarter Round Functions $QR-F$ with 32-bit input words and $Add $ , $Rotate $ , and $XOR (ARX)$ operations on 16, 12, 8, 7, 4, and 2 constants. Using these improved $QR-Fs$ , we expect EChacha20 to be more secure and effective against attacks than Chacha20. The threat model leveraged in this paper considers attacker assumptions based on the Bellare-Rogaway Model (B-RM) and the Chosen Plaintext Attack (CPA) to assess the potential security weaknesses. Then, the study analyzes the EChacha20 cipher using the NIST Statistical Test Suite (NSTS) and demonstrates its effectiveness against differential cryptanalysis. A differential attack addresses this challenge, where the study comprehensively analyses the differences between original and flipped bits. The NSTS has been used to statistically analyze the outcome for uniformity and evaluate the randomness of generating sequences of tests considering 1000 tests based on a range of $[{0,1}]$ . Uniformity is evaluated based on the $p-values$ test against a battery of passing sequences, and 100% is achieved from $Runs$ and $Serial (2): Test 1$ , respectively. The performance evaluation metrics leveraged include encryption speed, decryption speed, and memory usage. Based on the test conducted, it has been observed that with increased $QR-F$ , EChacha20 maintains a good balance in speed although slightly higher than Chacha20; however, with also slightly high memory usage compared to Chacha20. Despite that, a comparative study has been conducted against state-of-the-art studies, and the outcome has been reported to show the significance of the current study. Ultimately, the outcome indicates that the EChacha20 cipher has improved $QR-F$ and security properties compared to Chacha20 and may provide a more robust encryption solution for various applications.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
具有增强四分之一圆函数的扩展Chacha20流密码
Chacha20是一种广泛使用的流密码,以使用排列函数来增强对密码分析的抵抗力而闻名。尽管现有文献突出了其优势,但值得进一步探索其对差异攻击的潜在易感性。本文提出了一种扩展Chacha20(EChacha20)流密码,对Chacha20进行了一些改进。它包含了增强的四分之一循环函数$QR-F$,带有32位输入字,以及对16、12、8、7、4和2个常量的$Add$、$Rotate$和$XOR(ARX)$运算。使用这些改进的$QRFs$,我们预计EChacha20比Chacha20更安全、更有效地抵御攻击。本文中使用的威胁模型考虑了基于Bellare Rogaway模型(B-RM)和Chosen Plaintext攻击(CPA)的攻击者假设,以评估潜在的安全弱点。然后,本研究使用NIST统计测试套件(NSTS)对EChacha20密码进行了分析,并证明了其对差分密码分析的有效性。差分攻击解决了这一挑战,该研究全面分析了原始比特和翻转比特之间的差异。NSTS已用于统计分析一致性的结果,并评估生成测试序列的随机性,考虑基于${0,1}]$范围的1000个测试。一致性是基于$p-values$测试对一组通过序列进行评估的,并且分别通过$Runs$和$Serial(2):测试1$实现100%。性能评估指标包括加密速度、解密速度和内存使用率。根据所进行的测试,已经观察到,随着$QR-F$的增加,EChacha20在速度上保持了良好的平衡,尽管略高于Chacha20;然而与Chacha20相比也具有略高的存储器使用率。尽管如此,还是与最先进的研究进行了比较研究,据报道,结果显示了当前研究的重要性。最终,结果表明,与Chacha20相比,EChacha20密码提高了$QR-F$和安全性,并可能为各种应用提供更强大的加密解决方案。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Access
IEEE Access COMPUTER SCIENCE, INFORMATION SYSTEMSENGIN-ENGINEERING, ELECTRICAL & ELECTRONIC
CiteScore
9.80
自引率
7.70%
发文量
6673
审稿时长
6 weeks
期刊介绍: IEEE Access® is a multidisciplinary, open access (OA), applications-oriented, all-electronic archival journal that continuously presents the results of original research or development across all of IEEE''s fields of interest. IEEE Access will publish articles that are of high interest to readers, original, technically correct, and clearly presented. Supported by author publication charges (APC), its hallmarks are a rapid peer review and publication process with open access to all readers. Unlike IEEE''s traditional Transactions or Journals, reviews are "binary", in that reviewers will either Accept or Reject an article in the form it is submitted in order to achieve rapid turnaround. Especially encouraged are submissions on: Multidisciplinary topics, or applications-oriented articles and negative results that do not fit within the scope of IEEE''s traditional journals. Practical articles discussing new experiments or measurement techniques, interesting solutions to engineering. Development of new or improved fabrication or manufacturing techniques. Reviews or survey articles of new or evolving fields oriented to assist others in understanding the new area.
期刊最新文献
Corrections to “A Systematic Literature Review of the IoT in Agriculture–Global Adoption, Innovations, Security Privacy Challenges” A Progressive-Assisted Object Detection Method Based on Instance Attention Ensemble Balanced Nested Dichotomy Fuzzy Models for Software Requirement Risk Prediction Enhancing Burn Severity Assessment With Deep Learning: A Comparative Analysis and Computational Efficiency Evaluation Inductor-Less Low-Power Low-Voltage Cross-Coupled Regulated-Cascode Transimpedance Amplifier Circuit in CMOS Technology
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1