On the Entropy of Arcfour Keys

نویسنده

  • Luke O'Connor
چکیده

Arcfour is a stream cipher that produces a byte keystream B fbig i where a keyK is used to select the initial state S and the bi are produced by the state transition Si Si Let the byte length of K be jKj and let S K be the initial state produced by K Two keys K K are considered equivalent if S K S K and further K is weak if jK j jK j We show that there is a class of weak keys based on the notion of string periodicity which contains weak bit keys and weak bit keys We exhibit bit keys whose entropy is no more than a byte We also present an algorithm for constructing the initial contents of the Arcfour state machine based on observing B fbig i The method is signi cantly faster than exhaustive search for initial the state S and shows that no additional security against brute force attacks is expected to be achieved by selecting keys K for which jKj Also it shows that if Arcfour is scaled down to operate on bit values with bit keys say suitable for smart card environments the state contents can be recovered in approximately operations

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Optimal Overcoming Weak Expectations

Barak et al. (CRYPTO’11) initiated the study of so called square-friendly applications which offer good security for keys with entropy deficiency (weak keys), for this reason being important for key derivation. The state of the art of security bounds was established by Dodis and Yu (TCC’13), by modelling ”weak” keys as distributions of high collision entropy. In this paper we answer the questio...

متن کامل

Improved Arcfour Modes for the Secure Shell (SSH) Transport Layer Protocol

Status of This Memo This document specifies an Internet standards track protocol for the Internet community, and requests discussion and suggestions for improvements. Please refer to the current edition of the "Internet Official Protocol Standards" (STD 1) for the standardization state and status of this protocol. Distribution of this memo is unlimited. Abstract This document specifies methods ...

متن کامل

Formally Assessing Cryptographic Entropy

Cryptography relies on the secrecy of keys. Measures of information, and thus secrecy, are called entropy. Previous work does not formally assess the cryptographically appropriate entropy of secret keys. This report defines several new forms of entropy appropriate for cryptographic situations. This report defines statistical inference methods appropriate for assessing cryptographic entropy.

متن کامل

A Preferred Definition of Conditional Rényi Entropy

The Rényi entropy is a generalization of Shannon entropy to a one-parameter family of entropies. Tsallis entropy too is a generalization of Shannon entropy. The measure for Tsallis entropy is non-logarithmic. After the introduction of Shannon entropy , the conditional Shannon entropy was derived and its properties became known. Also, for Tsallis entropy, the conditional entropy was introduced a...

متن کامل

The concept of logic entropy on D-posets

In this paper, a new invariant called {it logic entropy} for dynamical systems on a D-poset is introduced. Also, the {it conditional logical entropy} is defined and then some of its properties are studied.  The invariance of the {it logic entropy} of a system  under isomorphism is proved. At the end,  the notion of an $ m $-generator of a dynamical system is introduced and a version of the Kolm...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2005  شماره 

صفحات  -

تاریخ انتشار 2005