Questions tagged [chacha]
ChaCha is a family of stream ciphers proposed by Daniel J. Bernstein, as an evolution of Salsa20 with (conjecturally) improved resistance to cryptanalysis.
179
questions
1
vote
1
answer
174
views
Is using only one or two test vector(s) for ChaCha20 enough for validation of coded algorithm?
For validating the ChaCha20 encryption/decryption algorithm written in VB.NET, I am looking for more ChaCha20 test vectors that are based on the final spec for ChaCha20 that can be found here. See the ...
4
votes
1
answer
1k
views
XSalsa20Poly1305 for encryption at rest
I just found a project that used XSalsa20Poly1305 for transit and encryption at rest. I am trying to find some information if that is something worth trusting data to.
It feels a little hard to put ...
3
votes
1
answer
2k
views
It possible to encrypt .bmp bitmap files using Stream Cipher Chacha20?
Maybe this sounds like a stupid question. I'm sorry for that.
I just wanted to know is it possible to encrypt a bitmap image file like *.BMP, and generate the ciphertext which is an obscure bitmap ...
5
votes
1
answer
1k
views
NIST LWC finalists (AEAD) vs ChaCha20-Poly1305
NIST LWC finalists announced. My question is that how finalists are faster or slower than current golden lightweight AEAD standard -- ChaCha20-Poly1305.
Some benchmark among chacha20-poly1305 vs LWC ...
2
votes
3
answers
465
views
Benchmark for CSPRNG as stream ciphers?
My limitation in my security protocol is that I want my RNG as CSPRNG and I also want it to be super fast.
If I use Salsa20 or ChaCha or AES counter mode, I don't get the desired speed. I want my PRNG ...
1
vote
0
answers
285
views
Constructing an XChaCha20-Poly1305 Equivalent using FIPS-140 Primitives
I am playing around with the idea of modelling clustered data storage as a series of AEAD messages. XChaCha20-Poly1305 has nice properties for my intended design, as the ability to use random IVs ...
1
vote
0
answers
290
views
Implement deterministic authenticated encryption using libsodium
Note: this is my first question on stack exchange, let me know if you miss some details to answer and I will edit the question accordingly
Context
I'm willing to create a git encryption tool (...
1
vote
1
answer
1k
views
Is it safe to use many nonces for XChaCha20?
I have a very simple question. Since XChaCha20 nonces are 192-bit, there's technically no limitation to the max number of message encrypted, since the chances of two random nonces being the same are ...
1
vote
1
answer
818
views
Can ChaCha20 provide integrity?
I have read that in general stream ciphers do not provide data integrity. Can ChaCha20 be implemented in such a way (perhaps like counter mode with message authentication in AES) to provide this?
1
vote
1
answer
381
views
Can Stream Cipher be Used to Encrypt & Decrypt a File (Eg: .txt .docx .exe .zip)?
I was new to cryptography. And I know that in the world of cryptography there are two types of Symmetric Algorithms:
Stream Cipher (RC4, Salsa & Chacha)
Block Cipher (DES, AES)
And when doing ...
8
votes
1
answer
1k
views
Understanding the impact of partitioning oracle attacks on stream ciphers
Yesterday I came across some conversation discussing partitioning oracle attacks, against authenticated stream ciphers like ChaCha20 and Salsa20 with poly1305 for MAC.
As I understand it (though the ...
10
votes
2
answers
5k
views
Changing an Encryption scheme from AES to ChaCha20
I am using the AES cipher for my OTT platform. Almost all Chip vendors (ARM, Intel, etc) have built-in AES for faster and secure processing.
Now, how feasible it is to move from AES to ChaCha20? ...
3
votes
2
answers
2k
views
What are best practices for long term storage (~20 years) of encrypted / sensitive files?
I have some very sensitive family files that I want to store in the cloud on multiple providers for maximal reliability and redundancy. It's essentially a large archive of all our family photos, ...
2
votes
0
answers
159
views
Encryption: filename + timestamp as info for HKDF-Expand
Let's assume that a user wants to symmetrically encrypt the files in one of his folders (being able to decrypt them later).
For this, I have come up with the following procedure:
A random 32 byte ...
0
votes
1
answer
190
views
Symmetric key as proof of ownership of a session?
I have a question, or rather multiple questions that all relate to the same topic.
I am building an application with both a frontend (FE) and a backend (BE). All communication between FE and BE is ...