The proof of security for XSalsa20 applies, without modification, to 'XChaCha20'. (It, in fact, applies equally well to X-AES, but the security strength for that is quite poor because of AES's blocksize.)<br><br>One can derive a similar result in the indifferentiabity framework, as well. (It follow straightforwardly from Coron et al.'s Chop-MD result.)<br><br>- David<br><div class="gmail_quote">On Fri, Apr 10, 2015 at 2:46 AM Michael Rogers <<a href="mailto:michael@briarproject.org">michael@briarproject.org</a>> wrote:<br><blockquote class="gmail_quote" style="margin:0 0 0 .8ex;border-left:1px #ccc solid;padding-left:1ex">On 08/04/15 16:06, David Leon Gil wrote:<br>
> If (1), I'd suggest Scrypt(hash=HChaCha20, kdf=Shake255)<br>
<br>
Side question: Has HChaCha been formally described and/or proven secure?<br>
There are various bits of code floating around on the net that apply the<br>
HSalsa20/XSalsa20 design to ChaCha to get HChaCha/XChaCha, but does the<br>
XSalsa20 security proof still apply?<br>
<br>
Cheers,<br>
Michael<br>
<br>
</blockquote></div>