Cryptography Reference
In-Depth Information
Theorem 5.6.6. For 3 ≤ r ≤N, P(z r = f r−1 )
0
1
[ r(r−1)
2
+r]
N −1
N
N −r
N
N −r + 1
N
N −1
N
1
N
@
A
+
N−r
r−2 γ r +
N −2
N
N −3
N
1
N ,
where
N−1−r
N−r
1
N
N −1
N
1
N
N −1
N
1
N
N −1
N
γ r =
+
.
Proof: Substituting y = r−1 in Theorem 3.1.5, we have
P(S r [r−1] = f r−1 ) = α r ,
where for 1 ≤r ≤ N,
[ r(r−1)
2
+r]
N −r + 1
N
N −1
N
+ 1
N .
After round r, suppose that the index r − 1 is touched for the first time by
j τ+1 in round τ + 1 of the KSA and due to the swap the value f r−1 is moved
to the index τ, r ≤ τ ≤ N − 1 and also prior to this swap the value at the
index τ was τ itself, which now comes to the index r − 1. This means that
from round r + 1 to round τ (both inclusive), the pseudo-random index j has
not taken the values r−1 and τ. So, after round τ + 1,
α r
P ((S τ+1 [r−1] = τ)∧(S τ+1 [τ] = f r−1 ))
= P ((S τ [r−1] = f r−1 )∧(S τ [τ] = τ)∧(j τ+1 = r−1))
τ−r 1
N −2
N
N .
From the end of round τ + 1 until the end of the KSA, f r−1 remains in index
τ and the value τ remains in index r−1 with probability ( N−2
N
= α r
) N−τ−1 . Thus,
P ((S N [r−1] = τ)∧(S N [τ] = f r−1 ))
τ−r 1
N
N−τ−1
N −2
N
N −2
N
= α r
N−r−1 1
N
N −2
N
= α r
= β r
(say).
Also, from Corollary 5.6.4, we have
P(S N [r] = 0)
= γ r
N−1−r
N−r
1
N
N −1
N
1
N
N −1
N
1
N
N −1
N
=
+
.
Search WWH ::




Custom Search