首页> 外文期刊>Designs, Codes and Crytography >Proving TLS-attack related open biases of RC4
【24h】

Proving TLS-attack related open biases of RC4

机译:证明TLS攻击相关的RC4开放偏差

获取原文
获取原文并翻译 | 示例

摘要

After a series of results on RC4 cryptanalysis in flagship cryptology conferences and journals, one of the most significant recent attacks on the cipher has been the discovery of vulnerabilities in the SSL/TLS protocol, by AlFardan et al. (USENIX 2013). Through extensive computations, they identified some new significant short-term single-byte biases in RC4 keystream sequence, and utilized those, along-with existing biases, towards the TLS attack. The current article proves these new and unproved biases in RC4, and in the process discovers intricate non-randomness within the cipher. In this connection, we also prove the anomaly in the 128th element of the permutation after the key scheduling algorithm. Finally, the proof for the extended key-length dependent biases in RC4 keystream sequence, a problem attempted and partially solved by Isobe et al. in FSE 2013, has also been completed in this work.
机译:在旗舰密码学会议和期刊上对RC4密码分析取得一系列结果之后,最近对该密码的最重要攻击之一是AlFardan等人发现SSL / TLS协议中的漏洞。 (USENIX 2013)。通过大量的计算,他们确定了RC4密钥流序列中的一些新的重要短期单字节偏差,并将这些偏差与现有偏差一起用于TLS攻击。当前文章证明了RC4中的这些新的和未经证实的偏差,并且在此过程中发现了密码中错综复杂的非随机性。在这方面,我们还证明了在密钥调度算法之后排列的第128个元素中的异常。最后,证明了RC4密钥流序列中扩展的依赖于密钥长度的偏差,这是Isobe等人尝试并部分解决的问题。在FSE 2013中,这项工作也已经完成。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号