|
Д.С. Кудияров "О сбоях в работе связанных генераторов псевдослучайных чисел RC4" |
|
Аннотация. В настоящей статье приводятся уточненные определения сбоев и расхождений в работе связанных генераторов псевдослучайных чисел RC4. Выполнена классификация сбоев, определено множество их возможных комбинаций в некоторый момент времени t в работе N - 1 пары связанных генераторов gN-1,0 и gN-1,б, где б ∈ [1; N - 1], оценены вероятности каждой комбинации. Ключевые слова: RC4, сбой, генератор, псевдослучайный. Стр. 53-70. D.S. Kudiyarov"On related RC4 pseudorandom number generators faults "This article contains more precise definitions of related pseudorandom number generators RC4 fault and derailment. Classification of faults is given. The set of possible fault combinations for N - 1 RC4 pairs gN-1,0 end gN-1,б (б ∈ [1; N - 1]) at the time t is defined. The probabilities of every fault combination are estimated. Keywords: RC4, fault, generator, pseudorandom. Полная версия статьи в формате pdf. REFERENCES 1. Kelsey J., Schneier B. Wagner D. Key-Schedule Cryptanalysis of 3-WAY, IDEA, G-DES, RC4, SAFER, and Triple-DES // Lecture Notes in Computer Science. – 1996. – T. 1109. – S. 237-251. – ISBN 978-3-540-68697-2 2. Grosul A. L., Wallach D. S. «A Related-Key Cryptanalysis of RC4». Rice University, 2000 [V Internete.. URL: http://cohesion.rice.edu/engineering/computerscience/tr/TR_Download.cfm?SDID=126. [Data obrashcheniya: 24.08.2014. 3. Fluhrer S., Mantin I., Shamir A. Weaknesses in the Key Scheduling Algorithm of RC4 // Lecture Notes in Computer Science.– 2001. – T. 2259. – S. 1-24. – ISBN 978-3-540-45537-0 4. Mantin I. A Practical Attack on the Fixed RC4 in the WEP Mode // Lecture Notes in Computer Science. – 2005. – T. 3788. –S. 395-411. – ISBN 978-3-540-32267-2 5. Klein A. Attacks on the RC4 stream cipher // Designs, Codes and Cryptography. – 2008. – T. 48. – № 43. – S. 269-286. – ISSN 1573-7586 6. Vaudenay S., Vuagnoux M. Passive–only Key Recovery Attacks on RC4 // Lecture Notes in Computer Science. – 2007. – T.4876. – S. 344-359. – ISBN 978-3-540-77360-3 7. Tews E., Weinmann R.-P., Pyshkin A. Breaking 104 Bit WEP in Less Than 60 Seconds // Lecture Notes in Computer Science. – 2007. – T. 4867. – S. 188-202. – ISBN 978-3-540-77535-5 8. Beck M., Tews E. Practical attacks against WEP and WPA // Proceeding WiSec '09 Proceedings of the second ACM conference on Wireless network security. – 2009. – S. 79-86. – ISBN 978-1-60558-460-7 9. Sepehrdad P., Vaudenay S., Vuagnoux M. Statistical attack on RC4 distinguishing WPA // Lecture Notes in Computer Science. – 2011. – T. 6632. S. 343-363. – ISBN 978-3-642-20465-4 10. Matsui M. Key Collisions of the RC4 Stream // Lecture Notes in Computer Science. – 2009. – T. 5665. – S. 38-50. – ISBN 978-3-642-03317-9 11. Chen J., Miyaji A. A New Class of RC4 Colliding Key Pairs With Greater Hamming Distance // Lecture Notes in Computer Science. – 2010. – T. 6047. – S. 30-44. – ISBN 978-3-642-12827-1 12. Chen J., Miyaji A. Generalized RC4 Key Collisions and Hash Collisions // Lecture Notes in Computer Science. – 2010. – T. 6280. – S. 73-87. – ISBN 978-3-642-15317-4 13. Chen J., Miyaji A. Generalized Analysis on Key Collisions of Stream Cipher RC4 // IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Sciences. – 2010. – T. E94-A. – № 11. – S. 2194-2206. – ISSN 1745-1337 14. Chen J., Miyaji A. How to Find Short RC4 Colliding Key Pairs // Lecture Notes in Computer Science. – 2011. – T. 7001. – S. 32-46. – ISBN 978-3-642-24861-0 15. Chen J., Miyaji A. Novel strategies for searching RC4 key collisions // Computers & Mathematics with Applications. – 2013. – T. 66. – № 1. – S. 81–90. – ISSN 0898-1221 16. Chen J., Miyaji A. A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model // Lecture Notes in Computer Science. – 2011. – T. 6584. – S. 62-76. – ISBN 978-3-642-21518-6 17. Chen J., Miyaji A. Cryptanalysis of Stream Ciphers from a New Aspect: How to Apply Key Collisions to Key Recovery Attack // IEICE TRANSACTIONS on Fundamentals of Electronics, Communications and Computer Science. – 2012. – T. E95-A. – № 12. – S. 2148-2159. – ISSN 1745-1337.
|