Cryptography Reference
In-Depth Information
Each wrong entry in Next is a potential contributor to one conflict set, i.e.,
NumConflicts≤ X.
Assuming that the index j G is pseudo-randomly updated and each output
index is uniformly randomly distributed, we have P(x ρ,y = 1) = N−1
N
. Thus,
E(x ρ,y ) = N−1
N
and
R−3
N
N−1
E(X)
=
E(x ρ,y ) +
E(x R−2,y )
ρ=0
y=1
y=1
(R−1)(N −1)− N −1
N
=
.
Thus, the attacker can run the PartResolvePerm algorithm once on the
sequence of available keystream bytes and count the number of conflict sets.
Numconflicts would be O(R) if j G is stuck during the interval when those
keystream bytes were generated; otherwise, Numconflicts will be O(RN).
RESEARCH PROBLEMS
Problem 8.1 Can Algorithm 8.2.1 be improved to detect Finney cycles more
e ciently?
Problem 8.2 Can a fault attack be mounted if instead of the whole byte of
j, a single of j is stuck?
Problem 8.3 Can a fault attack be mounted if the attacker can choose spe-
cific bits of j to inject faults?
Search WWH ::




Custom Search