Description |
xxv, 285 pages : illustrations ; 25 cm |
Series |
Discrete mathematics and its applications |
|
Discrete mathematics and its applications.
|
Contents |
Machine generated contents note: 1.1.Etymology and Some Historical Facts -- 1.2.Primary Goals of Cryptography -- 1.3.Basic Terminology -- 1.4.Cryptographic Attack Models -- 1.5.Cryptographic Security -- 1.6.Private and Public Key Cryptosystems -- 2.1.Introduction to Stream Ciphers -- 2.2.Attack Models for Stream Cipher Cryptanalysis -- 2.2.1.Brute Force Key Search -- 2.2.2.Weak Keys -- 2.2.3.Distinguishers -- 2.3.Hardware Stream Ciphers -- 2.4.Software Stream Ciphers -- 2.4.1.RC4 Stream Cipher -- 2.5.On Randomness and Pseudo-Randomness -- 3.1.Bias of Permutation toward Secret Key -- 3.1.1.Roos' Biases -- 3.1.2.Intrinsic Weakness of Shuffle-Exchange Type KSA -- 3.1.3.Biases of Nested Permutation Entries to Secret Key -- 3.2.Non-Randomness of Permutation -- 3.2.1.Biased Sign of RC4 Permutation -- 3.2.2.Bias in Each Permutation Byte -- 3.2.3.Anomaly Pairs -- 3.3.Movement Frequency of Permutation Values -- 3.4.Key Collisions -- Research Problems -- 4.1.Reversibility of RC4 PRGA -- |
|
Contents note continued: 4.2.Recovery through Solving Simultaneous Equations -- 4.3.Improvement by Difference Equations -- 4.4.Group of Key Bytes Approach -- 4.5.Byte by Byte Recovery -- 4.5.1.Related Theoretical Results -- 4.5.2.A Set of Recovery Methods -- 4.6.Bit by Bit Recovery -- 4.7.Bidirectional Key Search -- 4.7.1.Sequences of Filter Indices -- 4.7.2.Application of Filter Sequences in Bidirectional Key Search -- Research Problems -- 5.1.Finney Cycles -- 5.2.Glimpse Theorem -- 5.3.Biased Permutation Index Selection for the First Keystream Byte -- 5.4.Characterization of PRGA Evolution -- 5.4.1.One Step of RC4 PRGA -- 5.4.2.Two Steps of RC4 PR GA -- 5.5.Some Biases in First Keystream Byte toward Secret Key -- 5.5.1.Results for Any Arbitrary Secret Key -- 5.5.2.Results for Secret Keys Whose First Two Bytes Sum to Zero -- 5.5.3.Cryptanalytic Applications -- 5.6.More Biases in Many Keystream Bytes toward Secret Key -- 5.6.1.Biases of zr toward r - [ƒ]r -- |
|
Contents note continued: 5.6.2.Biases of zr toward r for Initial Keystream Bytes -- 5.6.3.Cryptanalytic Applications -- 5.6.4.Further Biases when Pseudo-Random Index Is Known -- 5.7.Exhaustive Enumeration of All Biases -- 5.8.State Recovery from Keystream -- 5.8.1.Partial Recovery Using Predictive States -- 5.8.2.Knudsen et al.'s Attack and Its Improvements -- 5.8.3.Maximov et al.'s Attack -- Research Problems -- 6.1.A Theoretical Framework of Distinguishing Attacks -- 6.2.Distinguishers Based on Initial Keystream Bytes -- 6.2.1.Negative Bias in the First Byte toward Zero -- 6.2.2.Strong Positive Bias in the Second Byte toward Zero -- 6.2.3.Positive Biases in Bytes 3 to 255 toward Zero -- 6.2.4.Distinguishers Based on Combination of Biases in RC4 Permutation -- 6.3.Distinguishers Based on Any Stage of PRGA -- 6.3.1.Digraph Repetition Bias -- 6.3.2.A Conditional Bias in Equality of Any Two Consecutive Bytes -- 6.3.3.Extension of "z2 = 0" Bias: Best Long-Term Bias in Keystream -- |
|
Contents note continued: Research Problems -- 7.1.RC4 in WEP and the Attack Principle -- 7.2.FMS Attack -- 7.3.Mantin's Attack -- 7.4.Klein's Attack -- 7.5.PTW and VX Attacks -- 7.6.RC4 in WPA and Related Attacks -- Research Problems -- 8.1.Hoch and Shamir's Attack -- 8.2.Impossible and Differential Fault Attacks -- 8.2.1.Impossible Fault Attack -- 8.2.2.Differential Fault Attack -- 8.3.Fault Attack Based on Fork Model -- 8.4.Fault Attack with Pseudo-Random Index Stuck -- 8.4.1.Analysis of StuckPRGA -- 8.4.2.State Recovery of RC4 with StuckPRGA -- 8.4.3.State Recovery when Both Indices Are Unknown -- 8.4.4.Detecting the Stuck-At Fault -- Research Problems -- 9.1.Byte-Oriented Variants -- 9.2.Word-Oriented Variants -- 9.3.RC4-Based Hash -- 9.4.RC4+ -- 9.4.1.KSA+: Modifications to RC4 KSA -- 9.4.2.PRGA+: Modifications to RC4 PRGA -- 9.4.3.Performance Evaluation -- Research Problems -- 10.1.Description of HC-128 -- 10.2.Linear Approximation of Feedback Functions -- |
|
Contents note continued: 10.3.Distinguishing Attacks on HC-128 -- 10.3.1.Wu's LSB-Based Distinguisher -- 10.3.2.Extension of Wu's Distinguisher to Other Bits -- 10.3.3.A Distinguisher Spread over Three 512-Word Blocks -- 10.4.Collisions in h1, h2 and State Leakage in Keystream -- 10.5.Constructing Full-State Given Only Half-State Information -- 10.5.1.Formulation of Half-State Exposure Analysis -- 10.5.2.State Reconstruction Strategy -- 10.6.Design Modification with Respect to Known Observations -- 10.6.1.Performance Evaluation -- Research Problems -- 11.1.Safe Use of RC4 |
Summary |
This book is the first comprehensive volume on RC4, the most popular and widely deployed state-of-the-art software stream cipher algorithm. After the basic fundamentals of cryptography, the text provides substantial coverage of stream ciphers in general |
Notes |
"A CRC title." |
Bibliography |
Includes bibliographical references and index |
Subject |
Stream ciphers.
|
|
Internet -- Security measures.
|
|
Data encryption (Computer science)
|
|
Computer security.
|
Author |
Maitra, Subhamoy, 1970-
|
LC no. |
2011039582 |
ISBN |
9781439831359 hardcover alkaline paper |
|
1439831351 hardcover alkaline paper |
|