Catálogo de publicaciones - libros
Selected Areas in Cryptography: 14th International Workshop, SAC 2007, Ottawa, Canada, August 16-17, 2007, Revised Selected Papers
Carlisle Adams ; Ali Miri ; Michael Wiener (eds.)
En conferencia: 14º International Workshop on Selected Areas in Cryptography (SAC) . Ottawa, ON, Canada . August 16, 2007 - August 17, 2007
Resumen/Descripción – provisto por la editorial
No disponible.
Palabras clave – provistas por la editorial
Data Encryption; Systems and Data Security; Management of Computing and Information Systems; Algorithm Analysis and Problem Complexity; Computer Communication Networks; Information Systems Applications (incl. Internet)
Disponibilidad
Institución detectada | Año de publicación | Navegá | Descargá | Solicitá |
---|---|---|---|---|
No detectada | 2007 | SpringerLink |
Información
Tipo de recurso:
libros
ISBN impreso
978-3-540-77359-7
ISBN electrónico
978-3-540-77360-3
Editor responsable
Springer Nature
País de edición
Reino Unido
Fecha de publicación
2007
Información sobre derechos de publicación
© Springer-Verlag Berlin Heidelberg 2007
Cobertura temática
Tabla de contenidos
A Generic Method to Design Modes of Operation Beyond the Birthday Bound
David Lefranc; Philippe Painchault; Valérie Rouat; Emmanuel Mayer
Given a PRP defined over {0,1}, we describe a new generic and efficient method to obtain modes of operation with a security level beyond the birthday bound 2. These new modes, named NAME (for New Encryption Modes of Operation), are based on a new contribution to the problem of transforming a PRP into a PRF. According to our approach, any generator matrix of a linear code of minimal distance , ≥ 1, can be used to design a PRF with a security of order 2. Such PRFs can be used to obtain NAME, the security level of which is of the same order (2). In particular, the well-known counter mode becomes a particular case when considering the identity linear code (of minimal distance = 1) and the mode of operation CENC [7] corresponds to the case of the the parity check linear code of minimal distance = 2. Any other generator matrix leads to a new PRF and a new mode of operation. We give an illustrative example using = 4 which reaches the security level 2 with a computation overhead less than 4% in comparison to the counter mode.
Pp. 328-343
Passive–Only Key Recovery Attacks on RC4
Serge Vaudenay; Martin Vuagnoux
We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector – a cryptographic scheme typically used by the WEP and WPA protocols to protect IEEE 802.11 wireless communications. First, we show how the previously discovered key recovery attacks can be improved by reducing the dependency between the secret key bytes. Then, we describe two new weaknesses related to the modulo operation of the key scheduling algorithm. Finally, we describe a passive-only attack able to significantly improve the key recovery process on WEP with a data complexity of 2 eavesdropped packets.
Pp. 344-359
Permutation After RC4 Key Scheduling Reveals the Secret Key
Goutam Paul; Subhamoy Maitra
A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in this paper, where the nonlinear operation is swapping among the permutation bytes. Explicit formulae are provided for the probabilities with which the permutation bytes after the KSA are biased to the secret key. Theoretical proofs of these formulae have been left open since Roos’s work (1995). Based on this analysis, an algorithm is devised to recover the bytes (i.e., 8 bits, typically 5 ≤ ≤ 16) secret key from the final permutation after the KSA with constant probability of success. The search requires (2) many operations which is the square root of the exhaustive key search complexity 2. Further, a generalization of the RC4 KSA is analyzed corresponding to a class of update functions of the indices involved in the swaps. This reveals an inherent weakness of shuffle-exchange kind of key scheduling.
Pp. 360-377
Revisiting Correlation-Immunity in Filter Generators
Aline Gouget; Hervé Sibert
Correlation-immunity is a cryptographic criterion on Boolean functions arising from correlation attacks on combining functions. When it comes to filtering functions, the status of correlation-immunity lacks study in itself and, if it is commonly accepted as a requirement for nonlinear filter generators, this is for other concerns. We revisit the concept of correlation-immunity and clear up its meaning for filtering functions. We summarize existing criteria similar to correlation-immunity and attacks in two different models, showing that such criteria are not relevant in both models. We also derive a precise property to avoid correlations due to the filter function only, which appears to be a bit looser than correlation-immunity. We then propose new attacks based on whether this property is verified.
Pp. 378-395
Distinguishing Attack Against TPypy
Yukiyasu Tsunoo; Teruo Saito; Takeshi Kawabata; Hiroki Nakashima
TPypy is a tweaked version of the Py stream cipher algorithm submitted to eSTREAM. Py uses a kind of processing referred to as a ‘rolling array’, the mixing of two types of array and one variable, to generate the keystream. TPypy is proposed as a highly secure stream cipher that fixes all of the previously identified weaknesses of Py.
This paper reports a significant bias in the pseudo-random generation algorithm of TPypy that can be exploited to distinguish the keystream obtained from multiple arbitrary secret key and initial vector pairs from a truly random number sequence using about 2 words.
Pp. 396-407