[300] in cryptography@c2.net mail archive
Re: standardizing key schedules
daemon@ATHENA.MIT.EDU (yoda)
Mon Feb 24 17:45:35 1997
Date: 24 Feb 1997 07:49:40 -0000
From: yoda <yoda@nym.alias.net>
To: cryptography@c2.net
Cc: reinhold@world.std.com, mignone@isi.ee.ethz.ch
-----BEGIN PGP SIGNED MESSAGE-----
In message <199702202133.WAA04110@isibee13.ethz.ch>
Domenico Mignone & Christoph Maeder wrote:
>A. G. Reinhold wrote:
>> The initial permutations RC4 produces are hardly random. Counting all key
>> lengths, RC4 can only produce 2**257 different permutations, a very sparse
>> subset of the 256! ~= 2**1684 possible permutations.
>
>You will reach only a subset of the possible permutations if you consider very
>short userkeys. But if the userkey is long enough then every permutation can be
>reached, as you can find in D.E.Knuth ``The Art Of Computer Programming'', Vol.2
But in the standard RC4 initialization, the maximal userkey is 256. How
do you know that this is sufficiently long?
You are claiming that the map is surjective (onto). The fact that
256^256 > 256^2 * 256! does not imply this.
>The only thing you can say is that initial permutations will probably not be
>equally distributed.
>How did you compute 2**257 as the number of different permutations that RC4 can
>produce?
>To our knowledge 256**256 different userkey can be chosen at random, using the
>full userkey length. This number is much bigger than 256!. Therefore you can
>expect that each permutation is reached at least once.
No, you cannot expect this without knowing something additional. You
can indeed use 256^256 user keys, but, as I stated above, your
conclusion does not follow unless you know that the map is surjective.
>
>Domenico Mignone & Christoph Maeder
Yoda
~~~~
This PGP signature only certifies the sender and date of the message.
It implies no approval from the administrators (admin@nym.alias.net).
Date: Mon Feb 24 07:49:39 1997 GMT
From: yoda@nym.alias.net
-----BEGIN PGP SIGNATURE-----
Version: 2.6.2
iQEVAwUBMxFIFE5NDhYLYPHNAQFsGgf8CNE3Ag5JmQDgUl+OpbdKrskFJY2vPurY
8hh+fr2IX5GNjf2E3zlgbpX+mSoJTpDN8cfcEPhN0myNNnM37f3KkEnqK+D2mQS5
ZQVYjbtjVf/hpKG0VzRdsNz9NRAZiZALerAQ2VgxRakYx/uy7oL5rmSZeZDC1Fad
TX3KPvLwWtnXJNz7s3kD3t25yPHufPNRh5ImnJ+/QV5N/M5MqztnzOsv2ZJ9SgOE
rn2goINrOhPSTgh2hgsKojpC8fAEq+qCC/Ik0fLswvYo7rzc6TkphdUhlrI32AM3
D33+mOH3D2qVyDHxUh0wnXWvCB1W+2cPkeKIlyTrAFqxhv0VW1NXbA==
=eCCs
-----END PGP SIGNATURE-----