International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

Marina Pudovkina

Affiliation: National Research Nuclear University (MEPhI)

Publications

Year
Venue
Title
2003
EPRINT
The number of initial states of the RC4 cipher with the same cycle structure
Marina Pudovkina
RC4 cipher is the most widely used stream cipher in software applications. It was designed by R. Rivest in 1987. In this paper we find the number of keys of the RC4 cipher generating initial permutations with the same cycle structure. We obtain that the distribution of initial permutations is not uniform.
2003
EPRINT
Properties of the Transformation Semigroup of the Solitaire Stream Cipher
Boris Pogorelov Marina Pudovkina
Stream ciphers are often used in applications where high speed and low delay are a requirement. The Solitaire stream cipher was developed by B. Schneier as a paper-and-pencil cipher. Solitaire gets its security from the inherent randomness in a shuffled deck of cards. In this paper we investigate semigroups and groups properties of the Solitaire stream cipher and its regular modifications.
2002
EPRINT
Statistical weaknesses in the alleged RC4 keystream generator
Marina Pudovkina
A large number of stream cipher were proposed and implemented over the last twenty years. In 1987 Rivest designed the RC4 stream cipher, which was based on a different and more software friendly paradigm. It was integrated into Microsoft Windows, Lotus Notes, Apple AOCE, Oracle Secure SQL, and many other applications, and has thus become the most widely used a software-based stream cipher. In this paper we describe some properties of an output sequence of RC4. It is proved that the distribution of first, second output values of RC4 and digraphs are not uniform, which makes RC4 trivial to distinguish between short outputs of RC4 and random strings by analyzing their first, or second output values of RC4 or digraphs.
2001
EPRINT
Cryptanalysis of the Vesta-2M Stream Cipher
Marina Pudovkina
In this paper the security of the stream cipher Vesta-2M is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known. The complexity the attack is estimated the time of searching through the square root of all possible initial states.
2001
EPRINT
A known plaintext attack on the ISAAC keystream generator
Marina Pudovkina
Stream ciphers are often used in applications where high speed and low delay are a requirement. The ISAAC keystream generator is a fast software-oriented encryption algorithm. In this papers the security of the ISAAC keystream generator is investigated. Cryptanalytic algorithm is developed for a known plaintext attack where only a small segment of plaintext is assumed to be known. Keywords. ISAAC. Keystream generator. Cryptanalysis.
2001
EPRINT
Analysis of chosen plaintext attacks on the WAKE Stream Cipher
Marina Pudovkina
Stream ciphers are an important class of encryption algorithms, which are widely used in practice. In this paper the security of the WAKE stream cipher is investigated. We present two chosen plaintext attacks on this cipher. The complexities of these attacks can be estimated as 10^^19.2 and 10^^14.4.

Coauthors

Boris Pogorelov (1)