首页> 外文会议>Information Security and Privacy >Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
【24h】

Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck

机译:如果j被卡住,则从2048个密钥流字节中恢复RC4置换

获取原文
获取原文并翻译 | 示例
获取外文期刊封面目录资料

摘要

In this paper, we study the behaviour of RC4 when the index j is stuck at a certain value not known to the attacker. Though it seems quite natural that RC4 would be weak if j does not change, it has never been studied earlier in a disciplined manner. This work presents the nontrivial issues involved in the analysis, identifying how the information regarding S starts leaking with as low as 258 keystream output bytes. The leakage of information increases as more bytes are available and finally the complete S is recovered with 2~(11) bytes in around 2~(25) time complexity. The attack considers that "the deterministic index i at the point when j got stuck" and "the value at which j remains stuck" are unknown. Further, the study presents a nice combinatorial structure that is relevant to the fault analysis of RC4.
机译:在本文中,我们研究了当索引j停留在攻击者未知的某个值时RC4的行为。尽管如果j不改变,RC4似乎很自然,但是它从来没有经过严格的研究。这项工作提出了分析中涉及的重要问题,确定了有关S的信息如何以低至258个键流输出字节开始泄漏。随着更多字节的可用,信息的泄漏增加,最后以大约2〜(25)个时间复杂度以2〜(11)个字节恢复完整的S。攻击者认为“ j被卡住时的确定性索引i”和“ j仍被卡住的值”是未知的。此外,该研究提出了一种与RC4的故障分析相关的良好组合结构。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号