{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:26:35Z","timestamp":1767338795679,"version":"3.40.3"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031803109"},{"type":"electronic","value":"9783031803116"}],"license":[{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:00:00Z","timestamp":1733961600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-3-031-80311-6_2","type":"book-chapter","created":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T00:30:49Z","timestamp":1733963449000},"page":"29-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["On Improved Cryptanalytic Results Against ChaCha for\u00a0Reduced Rounds $$\\ge 7$$"],"prefix":"10.1007","author":[{"given":"Nitin Kumar","family":"Sharma","sequence":"first","affiliation":[]},{"given":"Sabyasachi","family":"Dey","sequence":"additional","affiliation":[]},{"given":"Santanu","family":"Sarkar","sequence":"additional","affiliation":[]},{"given":"Subhamoy","family":"Maitra","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2024,12,12]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"470","DOI":"10.1007\/978-3-540-71039-4_30","volume-title":"Fast Software Encryption","author":"J-P Aumasson","year":"2008","unstructured":"Aumasson, J.-P., Fischer, S., Khazaei, S., Meier, W., Rechberger, C.: New features of Latin dances: analysis of salsa, ChaCha, and rumba. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 470\u2013488. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-71039-4_30"},{"key":"2_CR2","doi-asserted-by":"publisher","first-page":"29","DOI":"10.1007\/s00145-022-09437-z","volume":"35","author":"C Beierle","year":"2022","unstructured":"Beierle, C., Broll, M., Canale, F., et al.: Improved differential-linear attacks with applications to ARX ciphers. J. Cryptol. 35, 29 (2022). https:\/\/doi.org\/10.1007\/s00145-022-09437-z","journal-title":"J. Cryptol."},{"key":"2_CR3","doi-asserted-by":"publisher","unstructured":"Bernstein, D.J.: The Poly1305-AES Message-authentication code. In: Gilbert, H., Handschuh, H. (eds.) Fast Software Encryption. FSE 2005. LNCS, vol. 3557, pp. 32\u201349. Springer, Heidelberg (2005). https:\/\/doi.org\/10.1007\/11502760_3","DOI":"10.1007\/11502760_3"},{"key":"2_CR4","unstructured":"Bernstein, D.: ChaCha, a variant of Salsa20. In: Workshop Record of SASC, vol. 8, pp. 3\u20135 (2008). https:\/\/cr.yp.to\/chacha\/chacha-20080120.pdf"},{"key":"2_CR5","doi-asserted-by":"publisher","unstructured":"Bellini, E., Gerault, D., Grados, J., Makarim, R.H., Peyrin, T.: Boosting differential-linear cryptanalysis of ChaCha7 with MILP. IACR Trans. Symmetric Cryptol. 2023(2), 189\u2013223 (2023). https:\/\/doi.org\/10.46586\/tosc.v2023.i2.189-223","DOI":"10.46586\/tosc.v2023.i2.189-223"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1007\/978-3-030-56877-1_12","volume-title":"Advances in Cryptology \u2013 CRYPTO 2020","author":"C Beierle","year":"2020","unstructured":"Beierle, C., Leander, G., Todo, Y.: Improved differential-linear attacks with applications to ARX ciphers. In: Micciancio, D., Ristenpart, T. (eds.) CRYPTO 2020. LNCS, vol. 12172, pp. 329\u2013358. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-56877-1_12"},{"key":"2_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/3-540-38424-3_1","volume-title":"Advances in Cryptology-CRYPT0\u2019 90","author":"E Biham","year":"1991","unstructured":"Biham, E., Shamir, A.: Differential cryptanalysis of DES-like cryptosystems. In: Menezes, A.J., Vanstone, S.A. (eds.) CRYPTO 1990. LNCS, vol. 537, pp. 2\u201321. Springer, Heidelberg (1991). https:\/\/doi.org\/10.1007\/3-540-38424-3_1"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Choudhuri, A.R., Maitra, S.: Significantly improved multi-bit differentials for reduced round salsa and ChaCha. IACR Trans. Symmetric Cryptol. 2016(2), 261\u2013287 (2017). https:\/\/doi.org\/10.13154\/tosc.v2016.i2.261-287","DOI":"10.13154\/tosc.v2016.i2.261-287"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"711","DOI":"10.1007\/978-3-030-77870-5_25","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2021","author":"M Coutinho","year":"2021","unstructured":"Coutinho, M., Souza Neto, T.C.: Improved Linear Approximations to ARX Ciphers and Attacks Against ChaCha. In: Canteaut, A., Standaert, F.-X. (eds.) EUROCRYPT 2021. LNCS, vol. 12696, pp. 711\u2013740. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-77870-5_25"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Dey, S., Dey, C., Sarkar, S., Meier, W.: Revisiting cryptanalysis on ChaCha from crypto 2020 and Eurocrypt 2021. IEEE Trans. Inform. Theory 68(9), 6114\u20136133 (2022.) https:\/\/doi.org\/10.1109\/TIT.2022.3171865","DOI":"10.1109\/TIT.2022.3171865"},{"key":"2_CR11","unstructured":"ChaCha usage\u00a0 & deployment. https:\/\/ianix.com\/pub\/chacha-deployment.html"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Dey, S.: Advancing the idea of probabilistic neutral bits: first key recovery attack on 7.5 round ChaCha. IEEE Trans. Inform. Theory (2024). https:\/\/doi.org\/10.1109\/TIT.2024.3389874","DOI":"10.1109\/TIT.2024.3389874"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Dey, S., Garai, H.K., Maitra, S.: Cryptanalysis of reduced round ChaCha- new attack and deeper analysis. IACR Trans. Symmetric Cryptol., 89\u2013110 (2023). https:\/\/doi.org\/10.46586\/tosc.v2023.i1.89-110","DOI":"10.46586\/tosc.v2023.i1.89-110"},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Dey, S., Garai, H.K., Sarkar, S., Sharma, N.K.: Revamped differential-linear cryptanalysis on reduced round ChaCha. In: Dunkelman, O., Dziembowski, S. (eds.) Advances in Cryptology \u2013 EUROCRYPT 2022. EUROCRYPT 2022. LNCS, vol. 13277, pp. 86\u2013114. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-07082-2_4","DOI":"10.1007\/978-3-031-07082-2_4"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Dey, S., Garai, H.K., Sarkar, S., Sharma, N.K.: Enhanced differential-linear attacks on reduced round ChaCha. IEEE Trans. Inform. Theory 69(8), 5318\u20135336 (2023). https:\/\/doi.org\/10.1109\/TIT.2023.3269790","DOI":"10.1109\/TIT.2023.3269790"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Dey, S., Sarkar, S.: Improved analysis for reduced round Salsa and Chacha. Discrete Appl. Math. 227, 58\u201369 (2017). https:\/\/doi.org\/10.1016\/j.dam.2017.04.034","DOI":"10.1016\/j.dam.2017.04.034"},{"key":"2_CR17","unstructured":"Google. https:\/\/varindia.com\/news\/for-the-entry-level-smartphones-google-announced-a-new-encryption-solution--adiantum"},{"key":"2_CR18","doi-asserted-by":"publisher","unstructured":"Ishiguro, T., Kiyomoto, S., Miyake, Y.: Latin Dances Revisited: New Analytic Results of Salsa20 and ChaCha. In: Qing, S., Susilo, W., Wang, G., Liu, D. (eds.) Information and Communications Security. ICICS 2011. LNCS, vol. 7043, pp. 255\u2013266. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-25243-3_21","DOI":"10.1007\/978-3-642-25243-3_21"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Langford, S.K., Hellman, M.E.: Differential-linear cryptanalysis. In: Desmedt, Y.G. (eds.) Advances in Cryptology \u2014 CRYPTO 1994. CRYPTO 1994. LNCS, vol. 839, pp. 17\u201325. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_3","DOI":"10.1007\/3-540-48658-5_3"},{"key":"2_CR20","doi-asserted-by":"publisher","unstructured":"Maitra, S.: Chosen IV cryptanalysis on reduced round ChaCha and Salsa. Discrete Appl. Math. 208, 88\u201397 (2016). https:\/\/doi.org\/10.1016\/j.dam.2016.02.020","DOI":"10.1016\/j.dam.2016.02.020"},{"key":"2_CR21","doi-asserted-by":"publisher","unstructured":"Miyashita, S., Ito, R., Miyaji, A: PNB-focused differential cryptanalysis of ChaCha stream cipher. In: Nguyen, K., Yang, G., Guo, F., Susilo, W. (eds.) Information Security and Privacy. ACISP 2022. LNCS, vol. 13494, pp. 46\u201366. Springer, Cham (2022). https:\/\/doi.org\/10.1007\/978-3-031-22301-3_3","DOI":"10.1007\/978-3-031-22301-3_3"},{"key":"2_CR22","doi-asserted-by":"publisher","unstructured":"Matsui, M., Yamagishi, A.: A new method for known plaintext attack of FEAL cipher. In: Rueppel, R.A. (eds.) Advances in Cryptology \u2014 EUROCRYPT 1992. EUROCRYPT 1992. LNCS, vol. 658, pp. 81\u201391. Springer, Heidelberg (1993). https:\/\/doi.org\/10.1007\/3-540-47555-9_7","DOI":"10.1007\/3-540-47555-9_7"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Nir, Y., Langley, A.: ChaCha20 and Poly1305 for IETF Protocols. RFC 8439 (2018). https:\/\/www.rfc-editor.org\/info\/rfc8439","DOI":"10.17487\/RFC8439"},{"key":"2_CR24","doi-asserted-by":"publisher","unstructured":"Sharma, N.K., Dey, S.: Analyzing the probability of key recovery in the differential attacks against ChaCha. IEEE Access 12, 37000\u201337011, (2024). https:\/\/doi.org\/10.1109\/ACCESS.2024.3372857","DOI":"10.1109\/ACCESS.2024.3372857"},{"key":"2_CR25","doi-asserted-by":"publisher","unstructured":"Shi, Z., Zhang, B., Feng, D., Wu, W.: Improved Key Recovery Attacks on Reduced-Round Salsa20 and ChaCha. In: Kwon, T., Lee, MK., Kwon, D. (eds.) Information Security and Cryptology \u2013 ICISC 2012. ICISC 2012. LNVCS, vol. 7839, pp. 337\u2013351. Springer, Heidelberg (2013). https:\/\/doi.org\/10.1007\/978-3-642-37682-5_24","DOI":"10.1007\/978-3-642-37682-5_24"},{"key":"2_CR26","doi-asserted-by":"publisher","unstructured":"Wang, S., Liu, M., Hou, S., Lin, D.: Moving a step of ChaCha in syncopated rhythm. In: Handschuh, H., Lysyanskaya, A. (eds.) Advances in Cryptology \u2013 CRYPTO 2023. CRYPTO 2023. LNCS, vol. 14083, pp. 273\u2013304. Springer, Cham (2023). https:\/\/doi.org\/10.1007\/978-3-031-38548-3_10","DOI":"10.1007\/978-3-031-38548-3_10"},{"key":"2_CR27","doi-asserted-by":"publisher","unstructured":"Xu, Z., Xu, H., Tan, L., Qi, W.: Differential-linear cryptanalysis of reduced round ChaCha. IACR Trans. Symmetric Cryptol. 2024, 166\u2013189 (2024.) https:\/\/doi.org\/10.46586\/tosc.v2024.i2.166-189","DOI":"10.46586\/tosc.v2024.i2.166-189"}],"container-title":["Lecture Notes in Computer Science","Progress in Cryptology \u2013 INDOCRYPT 2024"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-80311-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,12]],"date-time":"2024-12-12T01:02:33Z","timestamp":1733965353000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-80311-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,12,12]]},"ISBN":["9783031803109","9783031803116"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-80311-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2024,12,12]]},"assertion":[{"value":"12 December 2024","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"INDOCRYPT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Cryptology in India","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Chennai","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21 December 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"indocrypt2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}