首页> 外文会议>WISA 2013 >Some New Weaknesses in the RC4 Stream Cipher
【24h】

Some New Weaknesses in the RC4 Stream Cipher

机译:RC4流密码中的一些新弱点

获取原文

摘要

In FSE 2011, Maitra and Paul observed that there exists negative bias in the first byte of the RC4 keystream towards 0. In this paper, we give our theoretical proof of this bias. This bias immediately provide distinguisher for RC4, and ciphertext only attack on broadcast RC4. Additionally, we discover some new weaknesses of the keystream bytes even after the first N rounds of the PRGA, where N is the size of the RC4 permutation, generally, N = 256. The weaknesses in turn provide us with certain state information from the keystream bytes no matter how many initial bytes are thrown away.
机译:在FSE 2011中,Maitra和Paul观察到RC4 Keystream的第一个字节中存在负面偏差,在0中。在本文中,我们提供了对此偏见的理论证明。此偏差立即为RC4提供逻辑,并且仅在广播RC4上攻击攻击。另外,即使在PRGA的第一个N轮之后,我们也会发现keystream字节的一些新弱点,其中n是RC4排列的大小,通常,n = 256.否定缺点向我们提供了来自键盘的某些状态信息无论抛出多少个初始字节,都是字节。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号