首页> 外文会议>Selected Areas in Cryptography >Permutation After RC4 Key Scheduling Reveals the Secret Key
【24h】

Permutation After RC4 Key Scheduling Reveals the Secret Key

机译:RC4密钥调度后的排列揭示了秘密密钥

获取原文

摘要

A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in this paper, where the nonlinear operation is swapping among the permutation bytes. Explicit formulae are provided for the probabilities with which the permutation bytes after the KSA are biased to the secret key. Theoretical proofs of these formulae have been left open since Roos's work (1995). Based on this analysis, an algorithm is devised to recover the l bytes (i.e., 8l bits, typically 5 ≤ l ≤ 16) secret key from the final permutation after the KSA with constant probability of success. The search requires O(2~(4l))) many operations which is the square root of the exhaustive key search complexity 2~(8l). Further, a generalization of the RC4 KSA is analyzed corresponding to a class of update functions of the indices involved in the swaps. This reveals an inherent weakness of shuffle-exchange kind of key scheduling.
机译:本文对RC4密钥调度算法(KSA)进行了理论分析,其中非线性操作在置换字节之间交换。提供了针对KSA之后的置换字节偏向密钥的概率的显式公式。自Roos的工作(1995年)以来,这些公式的理论证明一直没有公开。基于该分析,设计了一种算法,该算法以恒定的成功概率从KSA之后的最终置换中恢复出1个字节(即8个位,通常为5≤l≤16)的秘密密钥。搜索需要O(2〜(4l)))多次操作,这是穷举关键字搜索复杂度2〜(8l)的平方根。此外,对应于交换所涉及的索引的更新功能的类别,分析了RC4 KSA的概括。这揭示了随机交换类型的密钥调度的固有弱点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号