Cryptography Reference
In-Depth Information
The probability distribution of t 1 = S 1 [i 1 ] + S 1 [j 1 ] can be computed as
follows.
• For odd x,
N−1
P(S 1 [j 1 ] = v,S 1 [i 1 ] = N −v + x)
P(t 1 = x) =
v=0
v=1
= (N −1) 1
1
N .
N(N −1) =
• For even x= 2,
N−1
P(S 1 [j 1 ] = v,S 1 [i 1 ] = N −v + x)
P(t 1 = x) =
v=0
x
2 ,
N+x
2
v=1,
= (N −3) 1
1
N
2
N(N −1) =
N(N − 1) .
• For x = 2,
P(t 1 = 2) = P(S 1 [j 1 ] = 1,S 1 [i 1 ] = 1) +
N−1
P(S 1 [j 1 ] = v,S 1 [i 1 ] = N −v + 2)
v=0
v=1,
N+2
2
N + (N −2) 1
1
2N −3
N(N − 1) =
2
N
1
=
N(N −1) =
N(N −1) .
5.4 Characterization of PRGA Evolution
The work [9], for the first time, performed a complete characterization of
the RC4 PRGA for one step:
i r
= i r−1 + 1;j r
= j r−1 + S r [i r ];
swap S r−1 [i r ],S r−1 [j r ] to get S r ;
z r = S r [S r [i r ] + S r [j r ]].
Considering all the permutations (keeping in mind the Finney states also), the
distribution of z is shown to be non-uniform given i G ,j G . Further, analysis of
two consecutive steps of RC4 PRGA reveals that the index j G is not produced
uniformly at random given the value of j G two steps ago. The immediate
implication of the above results is that information about j G is leaked in the
keystream.
Search WWH ::




Custom Search