Limit search to available items
Book Cover
Book
Author Paul, Goutam.

Title RC4 stream cipher and its variants / Goutam Paul, Subhamoy Maitra
Published Boca Raton, FL : CRC Press, [2012]
©2012

Copies

Location Call no. Vol. Availability
 MELB  005.8 Pau/Rsc  AVAILABLE
 W'PONDS  005.8 Pau/Rsc  AVAILABLE
Description xxv, 285 pages : illustrations ; 25 cm
Series Discrete mathematics and its applications
Discrete mathematics and its applications.
Contents Machine generated contents note: 1.1.Etymology and Some Historical Facts -- 1.2.Primary Goals of Cryptography -- 1.3.Basic Terminology -- 1.4.Cryptographic Attack Models -- 1.5.Cryptographic Security -- 1.6.Private and Public Key Cryptosystems -- 2.1.Introduction to Stream Ciphers -- 2.2.Attack Models for Stream Cipher Cryptanalysis -- 2.2.1.Brute Force Key Search -- 2.2.2.Weak Keys -- 2.2.3.Distinguishers -- 2.3.Hardware Stream Ciphers -- 2.4.Software Stream Ciphers -- 2.4.1.RC4 Stream Cipher -- 2.5.On Randomness and Pseudo-Randomness -- 3.1.Bias of Permutation toward Secret Key -- 3.1.1.Roos' Biases -- 3.1.2.Intrinsic Weakness of Shuffle-Exchange Type KSA -- 3.1.3.Biases of Nested Permutation Entries to Secret Key -- 3.2.Non-Randomness of Permutation -- 3.2.1.Biased Sign of RC4 Permutation -- 3.2.2.Bias in Each Permutation Byte -- 3.2.3.Anomaly Pairs -- 3.3.Movement Frequency of Permutation Values -- 3.4.Key Collisions -- Research Problems -- 4.1.Reversibility of RC4 PRGA --
Contents note continued: 4.2.Recovery through Solving Simultaneous Equations -- 4.3.Improvement by Difference Equations -- 4.4.Group of Key Bytes Approach -- 4.5.Byte by Byte Recovery -- 4.5.1.Related Theoretical Results -- 4.5.2.A Set of Recovery Methods -- 4.6.Bit by Bit Recovery -- 4.7.Bidirectional Key Search -- 4.7.1.Sequences of Filter Indices -- 4.7.2.Application of Filter Sequences in Bidirectional Key Search -- Research Problems -- 5.1.Finney Cycles -- 5.2.Glimpse Theorem -- 5.3.Biased Permutation Index Selection for the First Keystream Byte -- 5.4.Characterization of PRGA Evolution -- 5.4.1.One Step of RC4 PRGA -- 5.4.2.Two Steps of RC4 PR GA -- 5.5.Some Biases in First Keystream Byte toward Secret Key -- 5.5.1.Results for Any Arbitrary Secret Key -- 5.5.2.Results for Secret Keys Whose First Two Bytes Sum to Zero -- 5.5.3.Cryptanalytic Applications -- 5.6.More Biases in Many Keystream Bytes toward Secret Key -- 5.6.1.Biases of zr toward r - [ƒ]r --
Contents note continued: 5.6.2.Biases of zr toward r for Initial Keystream Bytes -- 5.6.3.Cryptanalytic Applications -- 5.6.4.Further Biases when Pseudo-Random Index Is Known -- 5.7.Exhaustive Enumeration of All Biases -- 5.8.State Recovery from Keystream -- 5.8.1.Partial Recovery Using Predictive States -- 5.8.2.Knudsen et al.'s Attack and Its Improvements -- 5.8.3.Maximov et al.'s Attack -- Research Problems -- 6.1.A Theoretical Framework of Distinguishing Attacks -- 6.2.Distinguishers Based on Initial Keystream Bytes -- 6.2.1.Negative Bias in the First Byte toward Zero -- 6.2.2.Strong Positive Bias in the Second Byte toward Zero -- 6.2.3.Positive Biases in Bytes 3 to 255 toward Zero -- 6.2.4.Distinguishers Based on Combination of Biases in RC4 Permutation -- 6.3.Distinguishers Based on Any Stage of PRGA -- 6.3.1.Digraph Repetition Bias -- 6.3.2.A Conditional Bias in Equality of Any Two Consecutive Bytes -- 6.3.3.Extension of "z2 = 0" Bias: Best Long-Term Bias in Keystream --
Contents note continued: Research Problems -- 7.1.RC4 in WEP and the Attack Principle -- 7.2.FMS Attack -- 7.3.Mantin's Attack -- 7.4.Klein's Attack -- 7.5.PTW and VX Attacks -- 7.6.RC4 in WPA and Related Attacks -- Research Problems -- 8.1.Hoch and Shamir's Attack -- 8.2.Impossible and Differential Fault Attacks -- 8.2.1.Impossible Fault Attack -- 8.2.2.Differential Fault Attack -- 8.3.Fault Attack Based on Fork Model -- 8.4.Fault Attack with Pseudo-Random Index Stuck -- 8.4.1.Analysis of StuckPRGA -- 8.4.2.State Recovery of RC4 with StuckPRGA -- 8.4.3.State Recovery when Both Indices Are Unknown -- 8.4.4.Detecting the Stuck-At Fault -- Research Problems -- 9.1.Byte-Oriented Variants -- 9.2.Word-Oriented Variants -- 9.3.RC4-Based Hash -- 9.4.RC4+ -- 9.4.1.KSA+: Modifications to RC4 KSA -- 9.4.2.PRGA+: Modifications to RC4 PRGA -- 9.4.3.Performance Evaluation -- Research Problems -- 10.1.Description of HC-128 -- 10.2.Linear Approximation of Feedback Functions --
Contents note continued: 10.3.Distinguishing Attacks on HC-128 -- 10.3.1.Wu's LSB-Based Distinguisher -- 10.3.2.Extension of Wu's Distinguisher to Other Bits -- 10.3.3.A Distinguisher Spread over Three 512-Word Blocks -- 10.4.Collisions in h1, h2 and State Leakage in Keystream -- 10.5.Constructing Full-State Given Only Half-State Information -- 10.5.1.Formulation of Half-State Exposure Analysis -- 10.5.2.State Reconstruction Strategy -- 10.6.Design Modification with Respect to Known Observations -- 10.6.1.Performance Evaluation -- Research Problems -- 11.1.Safe Use of RC4
Summary This book is the first comprehensive volume on RC4, the most popular and widely deployed state-of-the-art software stream cipher algorithm. After the basic fundamentals of cryptography, the text provides substantial coverage of stream ciphers in general
Notes "A CRC title."
Bibliography Includes bibliographical references and index
Subject Stream ciphers.
Internet -- Security measures.
Data encryption (Computer science)
Computer security.
Author Maitra, Subhamoy, 1970-
LC no. 2011039582
ISBN 9781439831359 hardcover alkaline paper
1439831351 hardcover alkaline paper