Planned maintenance
A system upgrade is planned for 10/12-2024, at 12:00-13:00. During this time DiVA will be unavailable.
Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function
Blekinge Institute of Technology, Faculty of Computing, Department of Computer Science.ORCID iD: 0000-0003-4071-4596
2023 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 114220-114237Article in journal (Refereed) Published
Abstract [en]

Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance against cryptanalysis. Although the existing literature highlights its strengths, it is worth further exploring its potential susceptibility to differential attacks. This paper proposes an Extended Chacha20 (EChacha20) stream cipher, which offers a slight improvement of Chacha20. It incorporates enhanced Quarter Round Functions QR-F with 32-bit input words and Add , Rotate , and XOR (ARX) operations on 16, 12, 8, 7, 4, and 2 constants. Using these improved QR-Fs , we expect EChacha20 to be more secure and effective against attacks than Chacha20. The threat model leveraged in this paper considers attacker assumptions based on the Bellare-Rogaway Model (B-RM) and the Chosen Plaintext Attack (CPA) to assess the potential security weaknesses. Then, the study analyzes the EChacha20 cipher using the NIST Statistical Test Suite (NSTS) and demonstrates its effectiveness against differential cryptanalysis. A differential attack addresses this challenge, where the study comprehensively analyses the differences between original and flipped bits. The NSTS has been used to statistically analyze the outcome for uniformity and evaluate the randomness of generating sequences of tests considering 1000 tests based on a range of [{0,1}]. Uniformity is evaluated based on the p-values test against a battery of passing sequences, and 100% is achieved from Runs and Serial (2): Test 1 , respectively. The performance evaluation metrics leveraged include encryption speed, decryption speed, and memory usage. Based on the test conducted, it has been observed that with increased QR-F , EChacha20 maintains a good balance in speed although slightly higher than Chacha20; however, with also slightly high memory usage compared to Chacha20. Despite that, a comparative study has been conducted against state-of-the-art studies, and the outcome has been reported to show the significance of the current study. Ultimately, the outcome indicates that the EChacha20 cipher has improved QR-F and security properties compared to Chacha20 and may provide a more robust encryption solution for various applications. © 2023 The Authors.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023. Vol. 11, p. 114220-114237
Keywords [en]
Chacha20, EChacha20, Quater round function, Salsa20, stream cipher, Function evaluation, Cipher, Europe, Extended chacha20, Generator, NIST, Performances evaluation, Resistance, Round functions, Stream Ciphers, Cryptography
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-25549DOI: 10.1109/ACCESS.2023.3324612ISI: 001092086400001Scopus ID: 2-s2.0-85174828069OAI: oai:DiVA.org:bth-25549DiVA, id: diva2:1810206
Available from: 2023-11-07 Created: 2023-11-07 Last updated: 2023-11-20Bibliographically approved

Open Access in DiVA

fulltext(1849 kB)726 downloads
File information
File name FULLTEXT01.pdfFile size 1849 kBChecksum SHA-512
5329cc748c26302b587a8cb9a2c984f41a5c1c2f48bfe1676db3fa4ac6e248f42a809fd048fcf90578e82fcd5fedc8433206d87be6a1d8edd7c1381ce4f79edf
Type fulltextMimetype application/pdf

Other links

Publisher's full textScopus

Authority records

Kebande, Victor R.

Search in DiVA

By author/editor
Kebande, Victor R.
By organisation
Department of Computer Science
In the same journal
IEEE Access
Computer Sciences

Search outside of DiVA

GoogleGoogle Scholar
Total: 726 downloads
The number of downloads is the sum of all downloads of full texts. It may include eg previous versions that are now no longer available

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 272 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf