Cryptography Reference
In-Depth Information
5.6.4 Further Biases when Pseudo-Random Index Is Known
In all the biases discussed in this chapter so far, it is assumed that the
value of the pseudo-random index j G is unknown. In this section, we are
going to show that the biases in the permutation at some stage of the PRGA
propagates to the keystream at a later stage, if the value of the index j G at
the earlier stage is known.
Suppose that we know the value j τ of j G after the round τ in the PRGA.
With high probability, the value V at the index j τ would remain there, until
j τ is touched by the deterministic index i G for the first time after a few more
rounds depending on what was the position (τ mod N) of i G at the τ-th stage.
This immediately leaks V in keystream. More importantly, if the value V is
biased to the secret key bytes, then that information will be leaked too.
Formally, let
P(S τ [j τ ] = V ) = η τ
for some V . j τ
would be touched by i G in round r, where
r = τ + (j τ
−τ mod N) or τ + (N −τ mod N) + j τ
depending on whether
j τ > τ mod Norj τ
≤τ mod N
respectively. By Lemma 5.6.1, we have
r−τ−1 1
N
N −1
N
1
N .
P(S r−1 [j τ ] = V ) = η τ
+
Now, Lemma 5.6.3 immediately gives
r−τ−1 1
N
1
N
N −1
N
1
N
P(z r = r−V ) =
1 + η τ
+
.
For some special V 's, the form of η τ may be known. In that case, it would
be advantageous to probe the values of j G at particular rounds. For instance,
according to Corollary 5.6.2, after the (τ−1)-th round of the PRGA, S τ−1 [τ]
is biased to the linear combination f τ of the secret key bytes with probability
2
3
[ τ(τ+1)
2
+N ]
τ−1 1
N
N −τ
N
N −1
N
1
N
N −1
N
1
N .
4
5
η τ
+
+
At round τ, f τ would move to the index j τ due to the swap, and hence
S τ [j τ ] would be biased to f τ with the same probability. So, the knowledge
of j τ
would leak information about f τ in round
r = τ + (j τ
−τ mod N) or τ + (N −τ mod N) + j τ
Search WWH ::




Custom Search