Questions tagged [chacha]
ChaCha is a family of stream ciphers proposed by Daniel J. Bernstein, as an evolution of Salsa20 with (conjecturally) improved resistance to cryptanalysis.
179
questions
2
votes
2
answers
108
views
Can you use ChaCha20 as one-time pad?
My knowledge of cryptography nothing beyond basic so I am by no means an expert, but I do know a bit of undergraduate mathematics including number theory.
I know that stream ciphers like ChaCha20 is ...
0
votes
0
answers
48
views
ChaCha20 1Gb encryption speed question
I wrote a simple implementation of ChaCha20 encryptor for files in C using MbedTLS implementation. The process of encryption is standard - I set key, then for each block of fixed size I generate new ...
1
vote
1
answer
331
views
ChaCha20 as a block cipher
Would it be possible to use ChaCha20 as a block cipher? With the key, the entire block function can be reversed.
1
vote
2
answers
152
views
Constant values of ChaCha20
Is it possible to change the constant values of ChaCha20?
and how it will affect the security of the cipher.
1
vote
0
answers
72
views
Extended-Chacha20
Research paper: "Extended-Chacha20 Stream Cipher With
Enhanced Quarter Round Function"
The initial matrix is 6x6, but what are the exact inputs for each index, in other words, how will you ...
1
vote
2
answers
313
views
Hamming Distance and Avalanche effect in Cryptography?
I am new to Cryptography and I know there are better ways to test a cipher's effectiveness out there but in this case I am trying to test a cryptographic algorithm's(AES,xchacha20,twofish) hamming ...
3
votes
1
answer
473
views
Is there any way to measure entropy of encryption algorithms in python?
I am new to cryptography and I am trying to find a way to measure ciphertext entropy of encryption algorithms such as AES, Chacha20, etc for a school project. Is there any way to do it on Python? I ...
2
votes
1
answer
243
views
Why doesn't ChaCha use a 512bit key and xor parameters into it?
ChaCha has clear delineations between key, nonce, counter and constants.
What is the reason for not using a XEX-like ($k=0$) approach such that the ChaCha key is 512 bits and all the other things are ...
2
votes
1
answer
197
views
48-bit nonce reuse with ChaCha20
The situation:
I have a group with 20 members, each member broadcasting 1 message per second. Communicating one on one is possible, but 1 message per member per second is the absolute limit and every ...
0
votes
1
answer
155
views
Chacha20 key/nonce/counter correct usage
Setting all 48 ChaCha state bytes (key, nonce, initial counter) from one result of strong hash function like sha3-384 or blake2b - correct usage? or bad practice?
PS: using original chacha20 (8bytes ...
0
votes
1
answer
349
views
ChaCha20-Poly1305 and AES-GCM-SIV output size
Background information:
I need to encrypt 168bit messages, the ciphertext should, preferably, match the plaintext size. Message Authentication and Integrity is not a must, but a really important ...
2
votes
1
answer
137
views
Recommended output filter for Rumba20 [closed]
Rumba20 is a compression function that maps a 192-byte (1536-bit) string to a 64-byte (512-bit) string. It's designed to provide collision resistance by using Salsa20 (or ChaCha20) with the ...
3
votes
2
answers
1k
views
Encrypting arbitrary large files in AEAD chunks - how to protect against chunk reordering?
I would like to encrypt big files using an authenticated cipher. I am convinced to use approach where file is divided into smaller manageable chunks that fit easily in memory (e.g. 1-10MB size) which ...
0
votes
1
answer
212
views
If ChaCha20 only has 128 bits, is it secure?
ChaCha20 also provides 256-bit encryption, i.e, 2^256 possibilities of keys. But ChaCha20 is very fast, I think it provides at most 2^256 multiplied by decrypting time. 256-bit AES provides 254-bit ...
2
votes
1
answer
74
views
Choice of nonce for reproducible encryption
In my application I have an SQLite database that stores labels for images, like this:
IMAGE ID
LABEL
1
foo
1
bar
2
bar
3
foo
The LABEL column is indexed as it is important that I can efficiently ...