Extended-Chacha20 Stream Cipher With Enhanced Quarter Round Function
2023 (English)In: IEEE Access, E-ISSN 2169-3536, Vol. 11, p. 114220-114237Article in journal (Refereed) Published
Abstract [en]
Chacha20 is a widely used stream cipher known for using permutation functions to enhance resistance against cryptanalysis. Although the existing literature highlights its strengths, it is worth further exploring its potential susceptibility to differential attacks. This paper proposes an Extended Chacha20 (EChacha20) stream cipher, which offers a slight improvement of Chacha20. It incorporates enhanced Quarter Round Functions QR-F with 32-bit input words and Add , Rotate , and XOR (ARX) operations on 16, 12, 8, 7, 4, and 2 constants. Using these improved QR-Fs , we expect EChacha20 to be more secure and effective against attacks than Chacha20. The threat model leveraged in this paper considers attacker assumptions based on the Bellare-Rogaway Model (B-RM) and the Chosen Plaintext Attack (CPA) to assess the potential security weaknesses. Then, the study analyzes the EChacha20 cipher using the NIST Statistical Test Suite (NSTS) and demonstrates its effectiveness against differential cryptanalysis. A differential attack addresses this challenge, where the study comprehensively analyses the differences between original and flipped bits. The NSTS has been used to statistically analyze the outcome for uniformity and evaluate the randomness of generating sequences of tests considering 1000 tests based on a range of [{0,1}]. Uniformity is evaluated based on the p-values test against a battery of passing sequences, and 100% is achieved from Runs and Serial (2): Test 1 , respectively. The performance evaluation metrics leveraged include encryption speed, decryption speed, and memory usage. Based on the test conducted, it has been observed that with increased QR-F , EChacha20 maintains a good balance in speed although slightly higher than Chacha20; however, with also slightly high memory usage compared to Chacha20. Despite that, a comparative study has been conducted against state-of-the-art studies, and the outcome has been reported to show the significance of the current study. Ultimately, the outcome indicates that the EChacha20 cipher has improved QR-F and security properties compared to Chacha20 and may provide a more robust encryption solution for various applications. © 2023 The Authors.
Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2023. Vol. 11, p. 114220-114237
Keywords [en]
Chacha20, EChacha20, Quater round function, Salsa20, stream cipher, Function evaluation, Cipher, Europe, Extended chacha20, Generator, NIST, Performances evaluation, Resistance, Round functions, Stream Ciphers, Cryptography
National Category
Computer Sciences
Identifiers
URN: urn:nbn:se:bth-25549DOI: 10.1109/ACCESS.2023.3324612ISI: 001092086400001Scopus ID: 2-s2.0-85174828069OAI: oai:DiVA.org:bth-25549DiVA, id: diva2:1810206
2023-11-072023-11-072023-11-20Bibliographically approved