首页> 外文会议>International Workshop on Fast Software Encryption >A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher
【24h】

A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher

机译:RC4 Keystream发生器中的新弱点及改进密码安全的方法

获取原文

摘要

The paper presents a new statistical bias in the distribution of the first two output bytes of the RC4 keystream generator. The number of outputs required to reliably distinguish RC4 outputs from random strings using this bias is only 225 bytes. Most importantly, the bias does not disappear even if the initial 256 bytes are dropped. This paper also proposes a new pseudorandom bit generator, named RG4A, which is based on RC4's exchange shuffle model. It is shown that the new cipher oilers increased resistance against most attacks that apply to RC4. RC4A uses fewer operations per output byte and offers the prospect of implementations that can exploit its inherent parallelism to improve its performance further.
机译:本文在RC4键盘发生器的前两个输出字节的分布中提出了一种新的统计偏置。使用此偏差可靠地区分RC4输出所需的输出的数量仅为225字节。最重要的是,即使丢弃初始256字节,偏差也不会消失。本文还提出了一种名为RG4A的新伪和谐比特发生器,该比特发生器基于RC4的Exchange Shuffle模型。结果表明,新的密码油器增加了适用于RC4的大多数攻击的阻力。 RC4A使用每个输出字节的操作较少,并提供了可以利用其固有的并行性的实现的前景,以进一步提高其性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号