Cryptography Reference
In-Depth Information
Finally, note that the number of hops (n + 1) is bounded from below by 1
and from above by (r−t + 1), depending on the initial gap between t and r
positions. Considering the sum over t and n with this consideration, we get
the desired expression for P(S r−1 [r] = X).
The following is an immediate implication of Lemma 5.6.1.
Corollary 5.6.2. For 2 ≤r ≤ N −1, we have
r−1
1− 1
N
P(S r−1 [r] = f r ) ≈ p r
+
r−1
r−t
n
r−2−n
1−p r
N(N −1)
1
n!
r−t−1
N
1− 1
N
,
t=1
n=0
where
[ r(r+1)
2
+N]
N −r
N
N −1
N
1
N .
p r =
+
Proof: Taking X = f r and τ = 0 in Lemma 5.6.1, one obtains
P(S 0 [r] = f r )
= P(S N [r] = f r )
[ r(r+1)
2
+N]
N −r
N
N −1
N
1
N
+
(by Corollary 3.1.6)
= p r
(say).
Assume for all t = r, the events (S 0 [t] = f r ) are all equally likely and hence
substitute
P(S 0 [t] = f r ) = 1−p r
N −1 ,
in Lemma 5.6.1. This gives the desired expression.
Now consider the bias of each keystream output byte to a combination of
the secret key bytes. Let ω r denote the probabilities P(S r−1 [r] = f r ), r ≥ 1.
Theorem 5.6.3. For r ≥ 1, we have
1
N
P(z r = r−f r ) =
(1 + ω r ).
Proof: Take two separate cases in which the event (z r = r−f r ) can occur.
Case I: S r−1 [r] = f r and z r = r−S r−1 [r]. By Theorem 5.2.1, the contribu-
tion of this case is
2
N
P(S r−1 [r] = f r )P(z r = r−S r−1 [r]) = ω r
Search WWH ::




Custom Search