首页> 外文会议>International Workshop on Selected Areas in Cryptography >Permutation After RC4 Key Scheduling Reveals the Secret Key
【24h】

Permutation After RC4 Key Scheduling Reveals the Secret Key

机译:RC4密钥调度后的置换显示秘密密钥

获取原文

摘要

A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in this paper, where the nonlinear operation is swapping among the permutation bytes. Explicit formulae are provided for the probabilities with which the permutation bytes after the KSA are biased to the secret key. Theoretical proofs of these formulae have been left open since Roos's work (1995). Based on this analysis, an algorithm is devised to recover the l bytes (i.e., 8l bits, typically 5 ≤ l ≤ 16) secret key from the final permutation after the KSA with constant probability of success. The search requires O(2~(4l))) many operations which is the square root of the exhaustive key search complexity 2~(8l). Further, a generalization of the RC4 KSA is analyzed corresponding to a class of update functions of the indices involved in the swaps. This reveals an inherent weakness of shuffle-exchange kind of key scheduling.
机译:本文介绍了RC4密钥调度算法(KSA)的理论分析,其中非线性操作在置换字节之间交换。为允许KSA偏置到密钥后的允许字节提供了显式公式。自Roos的工作(1995年)以来,这些公式的理论证明已被遗留。基于该分析,设计了一种算法,以从KSA之后的最终置换中恢复L字节(即,8L位,通常为5≤L≤16)秘密密钥,其成功的恒定概率。搜索需要O(2〜(4L)))许多操作是穷举键搜索复杂度的平方根2〜(8L)。此外,对应于互换中涉及的索引的一类更新功能的分析RC4 KSA的概括。这揭示了后换交换的固有弱点。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号