Slide 72
Slide 72 text
Ryoma Ito (Miyaji Lab., Osaka University) February 4, 2019
Plaintext Recovery Attack –the PPS Attack- [PPS14]
72
Related Works
1. Estimate the accurate distribution on a per IV= (IV0
, IV1
) pair.
#$%,',(
≔ Pr ,'
= . , IV = 0x00,0x00 , … , 0xFF, 0cF4 , . = 0x00, … , 0xFF.
2. Obtain the induced distributions of the keystream vector (7
$%,8988
: , … , 7
$%,89;;
: )
7
$%,(
(:) = = > ?$%,@,'
= . ⨁ B
CD@DE
, . = 0x00, … , 0xFF.
3. Calculate the probability function of the multinomial distribution*
F
$%,:
=
G!
7
$%,8988
(:) ! III 7
$%,89;;
(:) !
J
(∈ 8988,… ,89;;
#
$%,',(
L
MN,O
(P)
.
4. Combine likelihoods across all bins
F:
= J
(8988,8988)D$%D(89;;,89;;)
F
$%,:
.
5. Determine the maximum-likelihood plaintext byte value P*
Chapter 6: Iterated RC4 Key Correlations of the Keystream Bytes
*The probability F: that plaintext candidate byte B is encrypted to ciphertext byte {?@,'
}CD@DE
follows a multinomial distribution with parameter G and S = #',8988
, … , #',89;; .