The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. ex. Some numerals are expressed as "XNUMX".
Copyrights notice
The original paper is in English. Non-English content has been machine-translated and may contain typographical errors or mistranslations. Copyrights notice
La classe conventionnelle de clés faibles sur le chiffrement de flux RC4 est définie comme un cas spécifique dans lequel les combinaisons des trois premiers octets de clé secrète satisfont deux équations relationnelles. Cet article développe et généralise les classes de clés faibles en utilisant des équations relationnelles généralisées et des classes spéciales de l'état interne (appelé état prédictif). Nous dérivons la probabilité que des classes généralisées de clés faibles divulguent les informations sur les octets de la clé secrète. De plus, nous énumérons les classes généralisées de clés faibles et montrons que la plupart d'entre elles divulguent plus d'informations sur la clé secrète que celle de Roos.
The copyright of the original papers published on this site belongs to IEICE. Unauthorized use of the original or translated papers is prohibited. See IEICE Provisions on Copyright for details.
Copier
Ryoichi TERAMURA, Toshihiro OHIGASHI, Hidenori KUWAKADO, Masakatu MORII, "Generalized Classes of Weak Keys on RC4 Using Predictive State" in IEICE TRANSACTIONS on Fundamentals,
vol. E94-A, no. 1, pp. 10-18, January 2011, doi: 10.1587/transfun.E94.A.10.
Abstract: Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using generalized relational equations and special classes of the internal state (called predictive state). We derive the probability that generalized classes of weak keys leak the information of bytes of the secret key. Furthermore, we enumerate the generalized classes of weak keys and show that most of them leak more information of the secret key than Roos' one.
URL: https://global.ieice.org/en_transactions/fundamentals/10.1587/transfun.E94.A.10/_p
Copier
@ARTICLE{e94-a_1_10,
author={Ryoichi TERAMURA, Toshihiro OHIGASHI, Hidenori KUWAKADO, Masakatu MORII, },
journal={IEICE TRANSACTIONS on Fundamentals},
title={Generalized Classes of Weak Keys on RC4 Using Predictive State},
year={2011},
volume={E94-A},
number={1},
pages={10-18},
abstract={Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using generalized relational equations and special classes of the internal state (called predictive state). We derive the probability that generalized classes of weak keys leak the information of bytes of the secret key. Furthermore, we enumerate the generalized classes of weak keys and show that most of them leak more information of the secret key than Roos' one.},
keywords={},
doi={10.1587/transfun.E94.A.10},
ISSN={1745-1337},
month={January},}
Copier
TY - JOUR
TI - Generalized Classes of Weak Keys on RC4 Using Predictive State
T2 - IEICE TRANSACTIONS on Fundamentals
SP - 10
EP - 18
AU - Ryoichi TERAMURA
AU - Toshihiro OHIGASHI
AU - Hidenori KUWAKADO
AU - Masakatu MORII
PY - 2011
DO - 10.1587/transfun.E94.A.10
JO - IEICE TRANSACTIONS on Fundamentals
SN - 1745-1337
VL - E94-A
IS - 1
JA - IEICE TRANSACTIONS on Fundamentals
Y1 - January 2011
AB - Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using generalized relational equations and special classes of the internal state (called predictive state). We derive the probability that generalized classes of weak keys leak the information of bytes of the secret key. Furthermore, we enumerate the generalized classes of weak keys and show that most of them leak more information of the secret key than Roos' one.
ER -