{"title":"具有增强四分之一圆函数的扩展Chacha20流密码","authors":"Victor R. Kebande","doi":"10.1109/ACCESS.2023.3324612","DOIUrl":null,"url":null,"abstract":"Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance against cryptanalysis. Although the existing literature highlights its strengths, it is worth further exploring its potential susceptibility to differential attacks. This paper proposes an Extended Chacha20 (EChacha20) stream cipher, which offers a slight improvement of Chacha20. It incorporates enhanced Quarter Round Functions \n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\n with 32-bit input words and \n<inline-formula> <tex-math>$Add $ </tex-math></inline-formula>\n, \n<inline-formula> <tex-math>$Rotate $ </tex-math></inline-formula>\n, and \n<inline-formula> <tex-math>$XOR (ARX)$ </tex-math></inline-formula>\n operations on 16, 12, 8, 7, 4, and 2 constants. Using these improved \n<inline-formula> <tex-math>$QR-Fs$ </tex-math></inline-formula>\n, we expect EChacha20 to be more secure and effective against attacks than Chacha20. The threat model leveraged in this paper considers attacker assumptions based on the Bellare-Rogaway Model (B-RM) and the Chosen Plaintext Attack (CPA) to assess the potential security weaknesses. Then, the study analyzes the EChacha20 cipher using the NIST Statistical Test Suite (NSTS) and demonstrates its effectiveness against differential cryptanalysis. A differential attack addresses this challenge, where the study comprehensively analyses the differences between original and flipped bits. The NSTS has been used to statistically analyze the outcome for uniformity and evaluate the randomness of generating sequences of tests considering 1000 tests based on a range of \n<inline-formula> <tex-math>$[{0,1}]$ </tex-math></inline-formula>\n. Uniformity is evaluated based on the \n<inline-formula> <tex-math>$p-values$ </tex-math></inline-formula>\n test against a battery of passing sequences, and 100% is achieved from \n<inline-formula> <tex-math>$Runs$ </tex-math></inline-formula>\n and \n<inline-formula> <tex-math>$Serial (2): Test 1$ </tex-math></inline-formula>\n, respectively. The performance evaluation metrics leveraged include encryption speed, decryption speed, and memory usage. Based on the test conducted, it has been observed that with increased \n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\n, EChacha20 maintains a good balance in speed although slightly higher than Chacha20; however, with also slightly high memory usage compared to Chacha20. Despite that, a comparative study has been conducted against state-of-the-art studies, and the outcome has been reported to show the significance of the current study. Ultimately, the outcome indicates that the EChacha20 cipher has improved \n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\n and security properties compared to Chacha20 and may provide a more robust encryption solution for various applications.","PeriodicalId":13079,"journal":{"name":"IEEE Access","volume":"11 ","pages":"114220-114237"},"PeriodicalIF":3.4000,"publicationDate":"2023-10-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285091.pdf","citationCount":"0","resultStr":"{\"title\":\"Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function\",\"authors\":\"Victor R. Kebande\",\"doi\":\"10.1109/ACCESS.2023.3324612\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance against cryptanalysis. Although the existing literature highlights its strengths, it is worth further exploring its potential susceptibility to differential attacks. This paper proposes an Extended Chacha20 (EChacha20) stream cipher, which offers a slight improvement of Chacha20. It incorporates enhanced Quarter Round Functions \\n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\\n with 32-bit input words and \\n<inline-formula> <tex-math>$Add $ </tex-math></inline-formula>\\n, \\n<inline-formula> <tex-math>$Rotate $ </tex-math></inline-formula>\\n, and \\n<inline-formula> <tex-math>$XOR (ARX)$ </tex-math></inline-formula>\\n operations on 16, 12, 8, 7, 4, and 2 constants. Using these improved \\n<inline-formula> <tex-math>$QR-Fs$ </tex-math></inline-formula>\\n, we expect EChacha20 to be more secure and effective against attacks than Chacha20. The threat model leveraged in this paper considers attacker assumptions based on the Bellare-Rogaway Model (B-RM) and the Chosen Plaintext Attack (CPA) to assess the potential security weaknesses. Then, the study analyzes the EChacha20 cipher using the NIST Statistical Test Suite (NSTS) and demonstrates its effectiveness against differential cryptanalysis. A differential attack addresses this challenge, where the study comprehensively analyses the differences between original and flipped bits. The NSTS has been used to statistically analyze the outcome for uniformity and evaluate the randomness of generating sequences of tests considering 1000 tests based on a range of \\n<inline-formula> <tex-math>$[{0,1}]$ </tex-math></inline-formula>\\n. Uniformity is evaluated based on the \\n<inline-formula> <tex-math>$p-values$ </tex-math></inline-formula>\\n test against a battery of passing sequences, and 100% is achieved from \\n<inline-formula> <tex-math>$Runs$ </tex-math></inline-formula>\\n and \\n<inline-formula> <tex-math>$Serial (2): Test 1$ </tex-math></inline-formula>\\n, respectively. The performance evaluation metrics leveraged include encryption speed, decryption speed, and memory usage. Based on the test conducted, it has been observed that with increased \\n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\\n, EChacha20 maintains a good balance in speed although slightly higher than Chacha20; however, with also slightly high memory usage compared to Chacha20. Despite that, a comparative study has been conducted against state-of-the-art studies, and the outcome has been reported to show the significance of the current study. Ultimately, the outcome indicates that the EChacha20 cipher has improved \\n<inline-formula> <tex-math>$QR-F$ </tex-math></inline-formula>\\n and security properties compared to Chacha20 and may provide a more robust encryption solution for various applications.\",\"PeriodicalId\":13079,\"journal\":{\"name\":\"IEEE Access\",\"volume\":\"11 \",\"pages\":\"114220-114237\"},\"PeriodicalIF\":3.4000,\"publicationDate\":\"2023-10-13\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://ieeexplore.ieee.org/iel7/6287639/10005208/10285091.pdf\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Access\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10285091/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Access","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10285091/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function
Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance against cryptanalysis. Although the existing literature highlights its strengths, it is worth further exploring its potential susceptibility to differential attacks. This paper proposes an Extended Chacha20 (EChacha20) stream cipher, which offers a slight improvement of Chacha20. It incorporates enhanced Quarter Round Functions
$QR-F$
with 32-bit input words and
$Add $
,
$Rotate $
, and
$XOR (ARX)$
operations on 16, 12, 8, 7, 4, and 2 constants. Using these improved
$QR-Fs$
, we expect EChacha20 to be more secure and effective against attacks than Chacha20. The threat model leveraged in this paper considers attacker assumptions based on the Bellare-Rogaway Model (B-RM) and the Chosen Plaintext Attack (CPA) to assess the potential security weaknesses. Then, the study analyzes the EChacha20 cipher using the NIST Statistical Test Suite (NSTS) and demonstrates its effectiveness against differential cryptanalysis. A differential attack addresses this challenge, where the study comprehensively analyses the differences between original and flipped bits. The NSTS has been used to statistically analyze the outcome for uniformity and evaluate the randomness of generating sequences of tests considering 1000 tests based on a range of
$[{0,1}]$
. Uniformity is evaluated based on the
$p-values$
test against a battery of passing sequences, and 100% is achieved from
$Runs$
and
$Serial (2): Test 1$
, respectively. The performance evaluation metrics leveraged include encryption speed, decryption speed, and memory usage. Based on the test conducted, it has been observed that with increased
$QR-F$
, EChacha20 maintains a good balance in speed although slightly higher than Chacha20; however, with also slightly high memory usage compared to Chacha20. Despite that, a comparative study has been conducted against state-of-the-art studies, and the outcome has been reported to show the significance of the current study. Ultimately, the outcome indicates that the EChacha20 cipher has improved
$QR-F$
and security properties compared to Chacha20 and may provide a more robust encryption solution for various applications.
IEEE AccessCOMPUTER SCIENCE, INFORMATION SYSTEMSENGIN-ENGINEERING, ELECTRICAL & ELECTRONIC
CiteScore
9.80
自引率
7.70%
发文量
6673
审稿时长
6 weeks
期刊介绍:
IEEE Access® is a multidisciplinary, open access (OA), applications-oriented, all-electronic archival journal that continuously presents the results of original research or development across all of IEEE''s fields of interest.
IEEE Access will publish articles that are of high interest to readers, original, technically correct, and clearly presented. Supported by author publication charges (APC), its hallmarks are a rapid peer review and publication process with open access to all readers. Unlike IEEE''s traditional Transactions or Journals, reviews are "binary", in that reviewers will either Accept or Reject an article in the form it is submitted in order to achieve rapid turnaround. Especially encouraged are submissions on:
Multidisciplinary topics, or applications-oriented articles and negative results that do not fit within the scope of IEEE''s traditional journals.
Practical articles discussing new experiments or measurement techniques, interesting solutions to engineering.
Development of new or improved fabrication or manufacturing techniques.
Reviews or survey articles of new or evolving fields oriented to assist others in understanding the new area.