The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
RC4 é a cifra de fluxo proposta por Rivest em 1987, que é amplamente utilizada em vários produtos comerciais devido à sua simplicidade e segurança substancial. RC4 explora o paradigma de troca aleatória, que usa uma permutação S. Muitos ataques foram relatados até agora. Nenhum estudo, entretanto, se concentrou nas correlações na Geração Pseudo-Aleatória (PRGA) entre duas permutações S e S' com algumas diferenças, no entanto, tais correlações estão relacionadas a uma fraqueza inerente do PRGA do tipo shuffle-exchange. Neste artigo, investigamos as correlações entre S e S' com algumas diferenças na rodada inicial. Mostramos que as correlações entre S e S' permanecer antes "i"está na posição onde existe uma diferença de bits diferente de zero na rodada inicial, e que as correlações permanecem com probabilidade não desprezível mesmo depois de"i" passado pela posição. Isso significa que as mesmas correlações entre S e S' será observado após a 255ª rodada. Isso revela uma fraqueza inerente ao PRGA do tipo troca aleatória.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copiar
Atsuko MIYAJI, Masahiro SUKEGAWA, "New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences" in IEICE TRANSACTIONS on Fundamentals,
vol. E93-A, no. 6, pp. 1066-1077, June 2010, doi: 10.1587/transfun.E93.A.1066.
Abstract: RC4 is the stream cipher proposed by Rivest in 1987, which is widely used in a number of commercial products because of its simplicity and substantial security. RC4 exploits shuffle-exchange paradigm, which uses a permutation S. Many attacks have been reported so far. No study, however, has focused on correlations in the Pseudo-Random Generation (PRGA) between two permutations S and S' with some differences, nevertheless such correlations are related to an inherent weakness of shuffle-exchange-type PRGA. In this paper, we investigate the correlations between S and S' with some differences in the initial round. We show that correlations between S and S' remain before "i" is in the position where the nonzero-bit difference exists in the initial round, and that the correlations remain with non negligible probability even after "i" passed by the position. This means that the same correlations between S and S' will be observed after the 255-th round. This reveals an inherent weakness of shuffle-exchange-type PRGA.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E93.A.1066/_p
Copiar
@ARTICLE{e93-a_6_1066,
author={Atsuko MIYAJI, Masahiro SUKEGAWA, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences},
year={2010},
volume={E93-A},
number={6},
pages={1066-1077},
abstract={RC4 is the stream cipher proposed by Rivest in 1987, which is widely used in a number of commercial products because of its simplicity and substantial security. RC4 exploits shuffle-exchange paradigm, which uses a permutation S. Many attacks have been reported so far. No study, however, has focused on correlations in the Pseudo-Random Generation (PRGA) between two permutations S and S' with some differences, nevertheless such correlations are related to an inherent weakness of shuffle-exchange-type PRGA. In this paper, we investigate the correlations between S and S' with some differences in the initial round. We show that correlations between S and S' remain before "i" is in the position where the nonzero-bit difference exists in the initial round, and that the correlations remain with non negligible probability even after "i" passed by the position. This means that the same correlations between S and S' will be observed after the 255-th round. This reveals an inherent weakness of shuffle-exchange-type PRGA.},
keywords={},
doi={10.1587/transfun.E93.A.1066},
ISSN={1745-1337},
month={June},}
Copiar
TY - JOUR
TI - New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 1066
EP - 1077
AU - Atsuko MIYAJI
AU - Masahiro SUKEGAWA
PY - 2010
DO - 10.1587/transfun.E93.A.1066
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E93-A
IS - 6
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - June 2010
AB - RC4 is the stream cipher proposed by Rivest in 1987, which is widely used in a number of commercial products because of its simplicity and substantial security. RC4 exploits shuffle-exchange paradigm, which uses a permutation S. Many attacks have been reported so far. No study, however, has focused on correlations in the Pseudo-Random Generation (PRGA) between two permutations S and S' with some differences, nevertheless such correlations are related to an inherent weakness of shuffle-exchange-type PRGA. In this paper, we investigate the correlations between S and S' with some differences in the initial round. We show that correlations between S and S' remain before "i" is in the position where the nonzero-bit difference exists in the initial round, and that the correlations remain with non negligible probability even after "i" passed by the position. This means that the same correlations between S and S' will be observed after the 255-th round. This reveals an inherent weakness of shuffle-exchange-type PRGA.
ER -