Information Theory Based Evaluation of the RC4 Stream Cipher Outputs

被引:5
作者
Madarro-Capo, Evaristo Jose [1 ]
Legon-Perez, Carlos Miguel [1 ]
Rojas, Omar [2 ]
Sosa-Gomez, Guillermo [2 ]
机构
[1] Univ Habana, Inst Criptog, Fac Matemat & Comp, Havana 10400, Cuba
[2] Univ Panamericana, Fac Ciencias Econom & Empresari, Alvaro Portillo 49, Zapopan 45010, Jalisco, Mexico
关键词
RC4; iterative probabilistic attacks; entropy; randomness;
D O I
10.3390/e23070896
中图分类号
O4 [物理学];
学科分类号
0702 ;
摘要
This paper presents a criterion, based on information theory, to measure the amount of average information provided by the sequences of outputs of the RC4 on the internal state. The test statistic used is the sum of the maximum plausible estimates of the entropies H(j(t)vertical bar z(t)), corresponding to the probability distributions P(j(t)vertical bar z(t)) of the sequences of random variables (j(t))(t is an element of)(T) and (z(t))(t is an element of T), independent, but not identically distributed, where zt are the known values of the outputs, while jt is one of the unknown elements of the internal state of the RC4. It is experimentally demonstrated that the test statistic allows for determining the most vulnerable RC4 outputs, and it is proposed to be used as a vulnerability metric for each RC4 output sequence concerning the iterative probabilistic attack.
引用
收藏
页数:10
相关论文
共 26 条
[1]  
Basharin G. P., 1959, Theory of Probability & Its Applications, V4, P333, DOI [10.1137/1104033, DOI 10.1137/1104033]
[2]  
Capo E.J.M., P 2016 INT C SOFTW P, P1, DOI [10.1109/CIMPS.2016.7802810, DOI 10.1109/CIMPS.2016.7802810]
[3]  
Chen JG, 2011, LECT NOTES COMPUT SC, V7001, P32, DOI 10.1007/978-3-642-24861-0_3
[4]  
Cover T. M., 2006, Elements of Information Theory: Solutions to Problems, V2nd
[5]  
Dhiman A., 2019, COMMUN COMPUT INF SC, V839, P308, DOI [10.1007/978-981-13-2372-0_27, DOI 10.1007/978-981-13-2372-0_27]
[6]  
Dodge Y., 2008, The concise encyclopedia of statistics
[7]  
Golic J.D., 2008, IACR Cryptology ePrint Archive, V2008, P348
[8]  
Golic J.D., 2000, Information Security and Privacy, 5th Australasian Conference, ACISP 2000, Brisbane, Australia, July 10-12, 2000, Proceedings, P220
[9]  
Grosul A.L., 2000, A related-key cryptanalysis of RC4
[10]  
Jindal Poonam, 2019, Microelectronics, Electromagnetics and Telecommunications. Proceedings of the Fourth ICMEET 2018. Lecture Notes in Electrical Engineering (LNEE 521), P367, DOI 10.1007/978-981-13-1906-8_38