Cryptography Reference
In-Depth Information
log 2 N
Since in each session we observe one sample, we need at least
p ses-
sions to reliably estimate u (here “reliably” means with probability > 50%).
The experimental observations related to various WEP attacks support this
information-theoretic lower bound.
7.2 FMS Attack
The main idea of the FMS attack [52] is as follows. For x > 1, consider that
the first x bytes of the secret key, i.e., K[0],...,K[x− 1] are known. Hence,
all the permutations S 1 ,...,S x and the indices j 0 ,...,j x are also known. In
round x+1, we have i x+1 = x and j x+1 = j x +S x [x]+K[x]. After the swap in
this round, S x+1 [x] gets the value of S x [j x+1 ]. Suppose we have the following.
S x [1] < x
(7.1)
and
S x [1] + S x [S x [1]] = x.
(7.2)
Conditions 7.1 and 7.2 together are called the resolved condition. If j x+1
{1,S x [1]} (the probability of which is
N−2
N
) then S x+1 [1] = S x [1] and
S x+1 [S x+1 [1]] = S x [S x [1]]. Thus,
N−2
= x.
S x+1 [1] + S x+1 [S x+1 [1]]
(7.3)
Recall that = means that the equality holds with probability p. In the next
N −x rounds, i.e., in
• the next (N−x−1) rounds of the KSA (corresponding to r = x+ 2,x+
3,...,N), and
• the first round of the PRGA,
index i r takes values in {x + 1,x + 2,...,N − 1,0} and hence does not visit
the indices 1, S x+1 [1] = S x [1] < x and x = S x+1 [1] + S x+1 [S x+1 [1]]. If j r also
does not visit these three indices in those rounds, the probability of which is
( N− N ) N−x , then the values at indices 1, S x+1 [1] and S x+1 [1]+S x+1 [S x+1 [1]] of
the permutation S x+1 are not swapped throughout the KSA and also during
the first round of the PRGA. Hence, the first keystream output byte is given
Search WWH ::




Custom Search