Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Toshihiro Ohigashi is active.

Publication


Featured researches published by Toshihiro Ohigashi.


fast software encryption | 2013

Full Plaintext Recovery Attack on Broadcast RC4

Takanori Isobe; Toshihiro Ohigashi; Yuhei Watanabe; Masakatu Morii

This paper investigates the practical security of RC4 in broadcast setting where the same plaintext is encrypted with different user keys. We introduce several new biases in the initial (1st to 257th) bytes of the RC4 keystream, which are substantially stronger than known biases. Combining the new biases with the known ones, a cumulative list of strong biases in the first 257 bytes of the RC4 keystream is constructed. We demonstrate a plaintext recovery attack using our strong bias set of initial bytes by the means of a computer experiment. Almost all of the first 257 bytes of the plaintext can be recovered, with probability more than 0.8, using only \(2^{32}\) ciphertexts encrypted by randomly-chosen keys. We also propose an efficient method to extract later bytes of the plaintext, after the 258th byte. The proposed method exploits our bias set of first 257 bytes in conjunction with the digraph repetition bias proposed by Mantin in EUROCRYPT 2005, and sequentially recovers the later bytes of the plaintext after recovering the first 257 bytes. Once the possible candidates for the first 257 bytes are obtained by our bias set, the later bytes can be recovered from about \(2^{34}\) ciphertexts with probability close to 1.


selected areas in cryptography | 2013

How to Recover Any Byte of Plaintext on RC4

Toshihiro Ohigashi; Takanori Isobe; Yuhei Watanabe; Masakatu Morii

In FSE 2013, Isobe et al. proposed efficient plaintext recovery attacks on RC4 in the broadcast setting where the same plaintext is encrypted with different user keys. Their attack is able to recover first 1000 terabytes of a plaintext with probability of almost one, given


international workshop on security | 2012

Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI

Takanori Isobe; Toshihiro Ohigashi; Masakatu Morii


international conference on cryptology in india | 2016

Some Proofs of Joint Distributions of Keystream Biases in RC4

Sonu Jha; Subhadeep Banik; Takanori Isobe; Toshihiro Ohigashi

2^{34}


Journal of Information Processing | 2014

Expanding Weak-key Space of RC4

Atsushi Nagao; Toshihiro Ohigashi; Takanori Isobe; Masakatu Morii


computer software and applications conference | 2014

Implementation and Evaluation of Secure Outsourcing Scheme for Secret Sharing Scheme on Cloud Storage Services

Toshihiro Ohigashi; Kouji Nishimura; Reiji Aibara; Kouta Yoshida

ciphertexts encrypted by different keys. Since their attack essentially exploits biases in the initial 1st to 257th bytes of the keystream, it does not work any more if such initial bytes are disregarded. This paper proposes two advanced plaintext recovery attacks that can recover any byte of a plaintext without relying on initial biases, i.e., our attacks are feasible even if initial bytes of the keystream are disregarded. The first attack is the modified Isobe et al.s attack. Using the partial knowledge of the target plaintext, e.g., only 6 bytes of the plaintext, the other bytes can be recovered with the high probability from


computer software and applications conference | 2017

Development of the Edge Computing Platform Based on Functional Modulation Architecture

Tohru Kondo; Hidenobu Watanabe; Toshihiro Ohigashi


Journal of Information Processing | 2013

Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack

Takanori Isobe; Toshihiro Ohigashi; Masakatu Morii

2^{34}


symposium on applications and the internet | 2010

Supporting USB Devices for the Global Migration

Hidenobu Watanabe; Hajime Masaoka; Toshihiro Ohigashi; Tohru Kondo; Kouji Nishimura; Reiji Aibara


Archive | 2009

A Practical Message Falsification Attack on WPA

Toshihiro Ohigashi; Masakatu Morii

ciphertexts. The second attack does not require any previous knowledge of a plaintext. In order to achieve it, we develop a guess-and-determine plaintext recovery method based on two strong long-term biases. Given

Collaboration


Dive into the Toshihiro Ohigashi's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge