Cryptography Reference
In-Depth Information
against the alternative hypothesis
1
N ,
K = K,P(E y 1 ,y 2 = e | H 1 ) =
H 1 :
0 ≤e ≤ N −1.
The optimum decision rule is given by the Neyman-Pearson Lemma [31] as
follows: select H 0 if M(S N , K) > T; otherwise, select H 1 , where
log (N −1)p y 1 ,y 2
1−p y 1 ,y 2
M(S N , K)
=
δ(e y 1 ,y 2 )
−1≤y 1 <y 2 ≤N−1
1
if e = 0;
and
δ(e)
=
0
otherwise.
According to [83], the implementation requires ( l(l+1)
2
−1)N + 1 memory and
l(l+1)
2 N l table look-ups. The false positive and negative rates depend on the
threshold T.
The above idea can be extended to a bit-level decision-making process,
assuming that N is a power of 2. In this case, one needs to test the null
hypothesis
H 0 : K = K mod 2 r ,
against the alternative hypothesis
H 1 : K = K mod 2 r ,
where
p y 1 ,y 2
for e = 0;
P(E y 1 ,y 2 = e mod 2 r | H 0 )
=
1−p y 1 ,y 2
2 r −1
for 1 ≤ e ≤ 2 r −1,
1
2 r ,
P(E y 1 ,y 2 = e mod 2 r | H 1 )
0 ≤e ≤ 2 r −1, and
=
N −2 r
2 r (N −1) (1 −p y 1 ,y 2 ).
p y 1 ,y 2
= p y 1 ,y 2 +
The measure for comparison against the threshold T is given by
log (2 r −1)p y 1 ,y 2
1−p y 1 ,y 2
M r (S N , K) =
δ(e y 1 ,y 2 mod 2 r ).
−1≤y 1 <y 2 ≤N−1
The key recovery technique is to search over all 2 l possible values of the r-th
LSB of the key bytes, 1 ≤ r ≤ 8, assuming that the first (r−1) LSBs of the key
bytes are known, and choose only N r out of them with the highest correlation
measure M r (S N , K). The complexity of this tree-based search algorithm can
R−2
i
be shown to be 2 l (1 +
N j ), where R = ⌈log 2 N⌉.
i=0
j=0
Search WWH ::




Custom Search