Full Plaintext Recovery Attacks on RC4 Using Multiple Biases

被引:6
|
作者
Ohigashi, Toshihiro [1 ]
Isobe, Takanori [2 ]
Watanabe, Yuhei [2 ]
Morii, Masakatu [2 ]
机构
[1] Hiroshima Univ, Informat Media Ctr, Higashihiroshima 7398511, Japan
[2] Kobe Univ, Grad Sch Engn, Kobe, Hyogo 6578501, Japan
关键词
RC4; stream cipher; keystream biases; plaintext recovery attack; guess-and-determine attack; broadcast setting; KEYS;
D O I
10.1587/transfun.E98.A.81
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RC4 is a widely-used stream cipher, adopted in many standard protocols, such as WEP, WPA and SSL/TLS, as a standard encryption algorithm. Isobe et al. proposed a plaintext recovery attack on RC4 in the broadcast setting, where the same plaintext is encrypted with different secret keys. Their attack is able to recover the first 257 bytes by exploiting the biases of the initial bytes of a keystream. In this paper, we propose two types of full plaintext recovery attacks that are able to recover all the bytes, even after the 258th byte, of a plaintext, unlike Isobe et al.'s attack. To achieve this, we combine the use of multiple keystream biases appropriately. The first attack utilizes the initial byte biases and Mantin's long-term bias. This attack can recover the first 1000 terabytes of a plaintext from 234 ciphertexts with a probability of almost one. The second attack is based on two long-term biases. Since this attack does not rely on the biases of the initial bytes of the RC4 keystream, it can recover any byte of a plaintext, even if the initial bytes are disregarded. Given 235 ciphertexts encrypted by different keys, any byte of a target plaintext can be recovered with a probability close to one.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 50 条
  • [1] Full Plaintext Recovery Attack on Broadcast RC4
    Isobe, Takanori
    Ohigashi, Toshihiro
    Watanabe, Yuhei
    Morii, Masakatu
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 179 - 202
  • [2] How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4
    Watanabe, Yuhei
    Isobe, Takanori
    Ohigashi, Toshihiro
    Morii, Masakatu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (03) : 803 - 810
  • [3] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [4] How to Recover Any Byte of Plaintext on RC4
    Ohigashi, Toshihiro
    Isobe, Takanori
    Watanabe, Yuhei
    Morii, Masakatu
    SELECTED AREAS IN CRYPTOGRAPHY - SAC 2013, 2014, 8282 : 155 - 173
  • [5] New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP
    Ito, Ryoma
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 190 - 202
  • [6] Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
    Garman, Christina
    Paterson, Kenneth G.
    Van der Merwe, Thyla
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 113 - 128
  • [7] Attacks on the RC4 stream cipher
    Andreas Klein
    Designs, Codes and Cryptography, 2008, 48 : 269 - 286
  • [8] Attacks on the RC4 stream cipher
    Klein, Andreas
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 269 - 286
  • [9] Analysing and exploiting the Mantin biases in RC4
    Remi Bricout
    Sean Murphy
    Kenneth G. Paterson
    Thyla van der Merwe
    Designs, Codes and Cryptography, 2018, 86 : 743 - 770
  • [10] Analysing and exploiting the Mantin biases in RC4
    Bricout, Remi
    Murphy, Sean
    Paterson, Kenneth G.
    van der Merwe, Thyla
    DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (04) : 743 - 770