{"updated":"2025-01-21T09:22:37.867377+00:00","metadata":{"_oai":{"id":"oai:ipsj.ixsq.nii.ac.jp:00106579","sets":["6164:6165:6462:7729"]},"path":["7729"],"owner":"11","recid":"106579","title":["RC4に対する平文回復攻撃の改良"],"pubdate":{"attribute_name":"公開日","attribute_value":"2014-10-15"},"_buckets":{"deposit":"cd5bedd5-08a7-461d-8dd3-9b5d7e77d2fd"},"_deposit":{"id":"106579","pid":{"type":"depid","value":"106579","revision_id":0},"owners":[11],"status":"published","created_by":11},"item_title":"RC4に対する平文回復攻撃の改良","author_link":["12776","12774","12772","12777","12775","12773"],"item_titles":{"attribute_name":"タイトル","attribute_value_mlt":[{"subitem_title":"RC4に対する平文回復攻撃の改良"},{"subitem_title":"Improvement on a Full Plaintext Recovery Attack against RC4","subitem_title_language":"en"}]},"item_keyword":{"attribute_name":"キーワード","attribute_value_mlt":[{"subitem_subject":"ストリーム暗号,RC4,平文回復攻撃","subitem_subject_scheme":"Other"}]},"item_type_id":"18","publish_date":"2014-10-15","item_language":{"attribute_name":"言語","attribute_value_mlt":[{"subitem_language":"jpn"}]},"item_18_text_3":{"attribute_name":"著者所属","attribute_value_mlt":[{"subitem_text_value":"広島大学情報メディア教育研究センター"},{"subitem_text_value":"神戸大学大学院工学研究科"},{"subitem_text_value":"神戸大学大学院工学研究科"}]},"item_18_text_4":{"attribute_name":"著者所属(英)","attribute_value_mlt":[{"subitem_text_value":"Information Media Center, Hiroshima University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"},{"subitem_text_value":"Graduate School of Engineering, Kobe University","subitem_text_language":"en"}]},"item_publisher":{"attribute_name":"出版者","attribute_value_mlt":[{"subitem_publisher":"情報処理学会","subitem_publisher_language":"ja"}]},"publish_status":"0","weko_shared_id":-1,"item_file_price":{"attribute_name":"Billing file","attribute_type":"file","attribute_value_mlt":[{"url":{"url":"https://ipsj.ixsq.nii.ac.jp/record/106579/files/IPSJCSS2014056.pdf"},"date":[{"dateType":"Available","dateValue":"2016-10-15"}],"format":"application/pdf","billing":["billing_file"],"filename":"IPSJCSS2014056.pdf","filesize":[{"value":"296.8 kB"}],"mimetype":"application/pdf","priceinfo":[{"tax":["include_tax"],"price":"660","billingrole":"5"},{"tax":["include_tax"],"price":"330","billingrole":"6"},{"tax":["include_tax"],"price":"0","billingrole":"30"},{"tax":["include_tax"],"price":"0","billingrole":"46"},{"tax":["include_tax"],"price":"0","billingrole":"44"}],"accessrole":"open_date","version_id":"d9a05b40-759e-40cd-bf65-d18755cbc2f6","displaytype":"detail","licensetype":"license_note","license_note":"Copyright (c) 2014 by the Information Processing Society of Japan"}]},"item_18_creator_5":{"attribute_name":"著者名","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"大東, 俊博"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"渡辺, 優平"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"森井, 昌克"}],"nameIdentifiers":[{}]}]},"item_18_creator_6":{"attribute_name":"著者名(英)","attribute_type":"creator","attribute_value_mlt":[{"creatorNames":[{"creatorName":"Toshihiro, Ohigashi","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Yuhei, Watanabe","creatorNameLang":"en"}],"nameIdentifiers":[{}]},{"creatorNames":[{"creatorName":"Masakatu, Morii","creatorNameLang":"en"}],"nameIdentifiers":[{}]}]},"item_resource_type":{"attribute_name":"資源タイプ","attribute_value_mlt":[{"resourceuri":"http://purl.org/coar/resource_type/c_5794","resourcetype":"conference paper"}]},"item_18_description_7":{"attribute_name":"論文抄録","attribute_value_mlt":[{"subitem_description":"Broadcast SettingのRC4において,暗号文のみから平文全体を復元できる平文回復攻撃がFSE 2013で五十部らによって提案された.その攻撃はRC4の初期の出力バイトのbiasとABSAB biasを用いることで,平文の先頭1000テラバイトを2^{34}個の暗号文から復元できる.その後,USENIX Security 2013でAlFardanらによって異なる平文回復攻撃が提案された.AlFardanらの攻撃は五十部らの攻撃とは異なるbiasと効果的なカウントアップ手法を用いている.本稿では五十部らの攻撃とAlFardanの攻撃を適切に組み合わせることで攻撃成功確率を向上させる.提案手法では平文バイトを復元できる確率が概ね1になるときの暗号文数を2^{33}まで減少させることに成功している.","subitem_description_type":"Other"}]},"item_18_description_8":{"attribute_name":"論文抄録(英)","attribute_value_mlt":[{"subitem_description":"The first full plaintext recovery attack on RC4 in the broadcast setting was proposed at FSE 2013 by Isobe et al. The attack uses the initial byte biases and ABSAB bias of RC4, and can recover 1000T Byte of a plaintext from 2^{34} ciphertexts. After that, at USENIX Security 2014, AlFardan et al. proposed a variant of the plaintext recovery attack with another biases and the sophisticated count-up method. In this paper, we propose a new full plaintext recovery attack by combining Isobe et al.'s attack and the main idea of AlFardan et al.'s attack. Our proposed attack can recover all plaintext bytes from 2^{33} ciphertexts.","subitem_description_type":"Other"}]},"item_18_biblio_info_10":{"attribute_name":"書誌情報","attribute_value_mlt":[{"bibliographicPageEnd":"433","bibliographic_titles":[{"bibliographic_title":"コンピュータセキュリティシンポジウム2014論文集"}],"bibliographicPageStart":"426","bibliographicIssueDates":{"bibliographicIssueDate":"2014-10-15","bibliographicIssueDateType":"Issued"},"bibliographicIssueNumber":"2","bibliographicVolumeNumber":"2014"}]},"relation_version_is_last":true,"weko_creator_id":"11"},"created":"2025-01-18T23:49:57.553547+00:00","id":106579,"links":{}}