首页> 外文会议>Fast Software Encryption >New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
【24h】

New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

机译:RC4密钥流字节中的排列偏差和秘密密钥泄漏的新形式

获取原文
获取原文并翻译 | 示例

摘要

Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for small values of y, is biased towards some linear combination of the secret key bytes. In this paper, for the first time we show that the bias can be observed in S[S[y]] too. Based on this new form of permutation bias after the KSA and other related results, a complete framework is presented to show that many keystream output bytes of RC4 are significantly biased towards several linear combinations of the secret key bytes. The results do not assume any condition on the secret key. We find new biases in the initial as well as in the 256-th and 257-th keystream output bytes. For the first time biases at such later stages are discovered without any knowledge of the secret key bytes. We also identify that these biases propagate further, once the information for the index j is revealed.
机译:考虑RC4中的置换S。 Roos在1995年指出,在RC4的密钥调度算法(KSA)之后,置换的每个初始字节(即y的较小值的S [y])都倾向于秘密密钥字节的某种线性组合。在本文中,我们首次证明了在S [S [y]]中也可以观察到偏差。基于KSA之后的这种新形式的置换偏差和其他相关结果,提出了一个完整的框架,以显示RC4的许多密钥流输出字节都明显偏向秘密密钥字节的几种线性组合。结果不假定密钥上有任何条件。我们在初始以及第256和257密钥流输出字节中发现了新的偏差。第一次发现了此类后期阶段的偏差,而无需任何秘密密钥字节的知识。一旦发现索引j的信息,我们还将确定这些偏差进一步传播。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号