Cryptography Reference
In-Depth Information
Proof: The event (j r+2 = i r+2 + j r+1
−j r ) can occur in two ways.
Case I: j r+1 = i r
+ 2. By Lemma 5.4.4,
j r+2
−j r
= j r+1 + (i r
2j r+1
=
+ 2)−j r .
Thus, the contribution of this part is
1
N .
P(j r+1 = i r
+ 2) =
Case II: j r+1
= i r
+ 2 and still j r+2 = i r+2 + j r+1
− j r
due to random
association. The probability contribution of this part is
1− 1
N
1
1
N .
N −1 =
Adding the above two contributions, we get the result.
Since S r+2 [j r+2 ] = S r+1 [i r+2 ] = j r+2
−j r+1 , we immediately arrive at the
following corollary.
2
Corollary 5.4.7. P(j r
N , r ≥ 0.
Now we show further leakage (different than Corollary 5.4.2) of information
about the pseudo-random index j from z.
= i r+2
−S r+2 [j r+2 ]) =
1
2
Theorem 5.4.8. P(z r+2 = j r ) =
N ), r ≥ 0.
Proof: The event (z r+2 = j r ) can occur in two possible ways.
Case I: Consider the events
N (1 +
z r+2 = i r+2
−S r+2 [j r+2 ]
and
−S r+2 [j r+2 ].
By Theorem 5.2.1 and Corollary 5.4.7, the probability contribution of
this part is
j r
= i r+2
2
N
2
4
N 2 .
N =
Case II: Consider that
−S r+2 [j r+2 ]
and still z r+2 = j r due to random association. The probability contri-
bution of this part is
= i r+2
z r+2
1− 2
N
1
N .
Search WWH ::




Custom Search