Cryptography Reference
In-Depth Information
Conditioned on the event that all the values j 1 ,j 2 ,...,j y are different from y,
which happens with probability ( N− N ) y , S y [y] remains the same as S 0 [y]. Note
that if at least one of the values j 1 ,j 2 ,...,j y hits the index y, the probability
that S y [y] remains the same as S 0 [y] is too small. Hence
y
N −1
N
P(S y [y] = S 0 [y]) ≈
.
This completes the proof.
Lemma 3.1.4. Assume that the index j takes its value from Z N independently
and uniformly at random at each round of the KSA. Then, for 0 ≤y ≤ r−1,
1 ≤r ≤ N,
r−1
N −y
N
N −1
N
P(S r [y] = S 0 [j y+1 ]) ≈
.
Proof: During round y + 1, the value of S y [j y+1 ] is swapped into S y+1 [y].
Now, the index j y+1 is not involved in any swap during the previous y many
rounds, if it is not touched by the indices {0,1,...,y − 1}, as well as if it is
not touched by the indices {j 1 ,j 2 ,...,j y
}. The probability of the former is
( N−y
N
) and the probability of the latter is ( N−1
N
) y . Hence,
y
N −y
N
N −1
N
P(S y+1 [y] = S 0 [j y+1 ]) ≈
.
After round y + 1, index y is not touched by any of the subsequent r−1−y
many j values with probability ( N−1
N
) r−1−y . Hence,
y
r−1−y
N −y
N
N − 1
N
N −1
N
P(S r [y] = S 0 [j y+1 ]) ≈
r−1
N −y
N
N − 1
N
=
.
Theorem 3.1.5. Assume that the index j takes its value from Z N inde-
pendently and uniformly at random at each round of the KSA. Then, for
0 ≤y ≤ r−1, 1 ≤ r ≤ N,
[ y(y+1)
2
+r]
N −y
N
N −1
N
1
N ,
P(S r [y] = f y ) ≈
+
where
y
y
f y = S 0
S 0 [x] +
K[x]
.
x=0
x=0
Search WWH ::




Custom Search