Recovery Attack –the PPS Attack- [PPS14] 72 Related Works 1. Estimate the accurate distribution on a per IV= (IV0 , IV1 ) pair. #$%,',( ≔ Pr ,' = . , IV = 0x00,0x00 , … , 0xFF, 0cF4 , . = 0x00, … , 0xFF. 2. Obtain the induced distributions of the keystream vector (7 $%,8988 : , … , 7 $%,89;; : ) 7 $%,( (:) = = > ?$%,@,' = . ⨁ B CD@DE , . = 0x00, … , 0xFF. 3. Calculate the probability function of the multinomial distribution* F $%,: = G! 7 $%,8988 (:) ! III 7 $%,89;; (:) ! J (∈ 8988,… ,89;; # $%,',( L MN,O (P) . 4. Combine likelihoods across all bins F: = J (8988,8988)D$%D(89;;,89;;) F $%,: . 5. Determine the maximum-likelihood plaintext byte value P* Chapter 6: Iterated RC4 Key Correlations of the Keystream Bytes *The probability F: that plaintext candidate byte B is encrypted to ciphertext byte {?@,' }CD@DE follows a multinomial distribution with parameter G and S = #',8988 , … , #',89;; .