Cryptography Reference
In-Depth Information
Proof: We would be referring to the events A 1 (y) and A 2 (y) in the proof
of Theorem 4.5.1. From Theorem 4.5.1, we have
N−1
y + 1
N
N −1
N
P (A 1 (y))
=
N−1
N −y
N
N −1
N
and P (A 2 (y))
=
.
For each probability p yx in items (1) and (2), we would consider two com-
ponents. The component which comes due to the contributions of the events
A 1 (y),A 2 (y) etc, would be called α yx . The other component is due to random
association and is given by (1−α yx ) N . So for each probability p yx , deriving
the part α yx su ces, as the total probability can be computed as
α yx + (1−α yx ) 1
N = N −1
1
N .
α yx +
N
Consider the update rule in the KSA:
j y+1 = j y + S y [y] + K[y],
0 ≤ y ≤N −1,
where j 0 = 0.
First, we prove item (1). Since S 0 [0] = 0, we can write j 1 = K[0]. Consid-
ering j 1 = S −1
N
[0], we have
α 01 = P (A 1 (0))
and considering j 1 = S N [0], we have
α 02 = P(A 2 (0)).
Substituting 0 for y in the expressions for P (A 1 (y)) and P (A 2 (y)), we get
the results.
Now, we come to item (2). In the update rule, S y [y] can be replaced by y,
assuming that it has not been touched by any one of j 1 ,j 2 ,...,j y in the first
y rounds of the KSA. This happens with a probability
y
N −1
N
,
0 ≤ y ≤N −1.
Assuming S y [y] = y, we can write
K[y] = j y+1
−j y
−y.
When considering the contribution of A 1 (y) to j y+1 , the factor ( N− N ) y need
not be taken into account, as the event (S y [y] = y) is already contained in
Search WWH ::




Custom Search