Debilidad SAC en el algoritmo de cifrado en flujo RC4 - SAC Weakness in RC4 stream cipher

Debilidad SAC en el algoritmo de cifrado en flujo RC4 - SAC Weakness in RC4 stream cipher

En este trabajo se describe una interesante v铆a para la detecci贸n de la existencia de entradas de colisi贸n en el algoritmo de cifrado en flujo RC4 basado en el criterio estricto de avalancha y se discuten los resultados obtenidos en comparaci贸n con las debilidades y ataques reportados sobre el RC4 q...

Saved in:
Journal Title: ReCIBE. Revista electr贸nica de Computaci贸n, Inform谩tica, Biom茅dica y Electr贸nica
First author: Evaristo J. Madarro Cap贸
Other Authors: Oristela Justiz Cuellar;
Carlos M Leg贸n;
Guillermo Sosa G贸mez
Palabras clave:
Language: Spanish
Get full text: http://recibe.cucei.udg.mx/ojs/index.php/ReCIBE/article/view/72
Resource type: Journal Article
Source: ReCIBE. Revista electr贸nica de Computaci贸n, Inform谩tica, Biom茅dica y Electr贸nica; Vol 6, No 1 (Year 2017).
DOI:
Publisher: Universidad de Guadalajara
Usage rights: Reconocimiento - NoComercial - CompartirIgual (by-nc-sa)
Categories: Physical/Engineering Sciences --> Computer Science, Information Systems
Health Sciences, Physical/Engineering Sciences --> Engineering, Biomedical
Physical/Engineering Sciences --> Engineering, Electrical --AMP-- Electronic
Bibliography: Adams, C., & Tavares, S. (1990). The Structured Design of Cryptographically Good S-boxes.

Chen, J., & Miyaji, A. (2011). Generalized Analysis on Key Collisions of Stream Ciphers RC4.

Fluhrer, S., Mantin, I., & Shamir, A. (2002). Attacks on RC4 and WEP.

Knuth, D. (1985). The Art of Computer Programming (Volume 2).

M. Cap贸, E., Leg贸n, C., Cuellar, O., & Sosa, G. (2016). Evaluation of Input - Output Statistical Dependence PRNGs by SAC. International Conference on Software Process Improvement (CIMPS). IEEE Digital Library.

Mantin, I. (2001). Analysis of the stream ciphers RC4.

Matsui, M. (2009). Key Collisions of the RC4 Stream Cipher.

Paul, G., & Maitra, S. (2012). RC4 Stream Ciphers and its Variants. Discrete Mathematics and Its Applications.

Schneier, B. (1996). Applied Cryptography.

Tsang, W., Hui, L., Chow, K., & Chong, C. (n.d.). Tuning the Collision Test for Stringency.

Wallach, D., & Grosul, A. (2000). A Related-Key Cryptanalysis of RC4. Rice University: Technical Report TR-00-358, Department of Computer Science.