Full Plaintext Recovery Attacks on RC4 Using Multiple Biases

被引:6
|
作者
Ohigashi, Toshihiro [1 ]
Isobe, Takanori [2 ]
Watanabe, Yuhei [2 ]
Morii, Masakatu [2 ]
机构
[1] Hiroshima Univ, Informat Media Ctr, Higashihiroshima 7398511, Japan
[2] Kobe Univ, Grad Sch Engn, Kobe, Hyogo 6578501, Japan
关键词
RC4; stream cipher; keystream biases; plaintext recovery attack; guess-and-determine attack; broadcast setting; KEYS;
D O I
10.1587/transfun.E98.A.81
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RC4 is a widely-used stream cipher, adopted in many standard protocols, such as WEP, WPA and SSL/TLS, as a standard encryption algorithm. Isobe et al. proposed a plaintext recovery attack on RC4 in the broadcast setting, where the same plaintext is encrypted with different secret keys. Their attack is able to recover the first 257 bytes by exploiting the biases of the initial bytes of a keystream. In this paper, we propose two types of full plaintext recovery attacks that are able to recover all the bytes, even after the 258th byte, of a plaintext, unlike Isobe et al.'s attack. To achieve this, we combine the use of multiple keystream biases appropriately. The first attack utilizes the initial byte biases and Mantin's long-term bias. This attack can recover the first 1000 terabytes of a plaintext from 234 ciphertexts with a probability of almost one. The second attack is based on two long-term biases. Since this attack does not rely on the biases of the initial bytes of the RC4 keystream, it can recover any byte of a plaintext, even if the initial bytes are disregarded. Given 235 ciphertexts encrypted by different keys, any byte of a target plaintext can be recovered with a probability close to one.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 50 条
  • [31] Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers
    Maximov, A
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 342 - 358
  • [32] Image Encryption using Modified RC4 Algorithm
    Hasan, Mahmoud H. S.
    Proceeding - 2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering, MI-STA 2023, 2023, : 430 - 434
  • [33] Some Combinatorial Results towards State Recovery Attack on RC4
    Das, Apurba
    Maitra, Subhamoy
    Paul, Goutam
    Sarkar, Santanu
    INFORMATION SYSTEMS SECURITY, 2011, 7093 : 204 - +
  • [34] Enhancing steganography using modified HHO and RC4
    Saber, Ranj T.
    Abdulhammed, Omar Y.
    NEXO REVISTA CIENTIFICA, 2023, 36 (06): : 1103 - 1131
  • [35] All Your Biases Belong To Us: Breaking RC4 in WPA-TKIP and TLS
    Vanhoef, Mathy
    Piessens, Frank
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 97 - 112
  • [36] Security Evaluation of RC4 using Big Data Analytics
    Liu, Cong
    Cai, Yong
    Wang, Taihong
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 316 - 320
  • [37] Separable Reversible Data Hiding Using Rc4 Algorithm
    Suresh, V.
    Saraswathy, C.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [38] Robust Software Watermarking Scheme Using RC4 and HASH
    Sun, Xiaoyan
    Zhang, Maosheng
    Zhu, Xiaoshu
    Li, Shuoming
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 229 - 236
  • [39] Multiple Selective Regions Image Cryptography on Modified RC4 Stream Cipher
    Chowdhury, Mahfuzulhoq
    Moniruzzaman, Md.
    Purohit, Parijat Prashun
    INTERNATIONAL JOURNAL OF GRID AND DISTRIBUTED COMPUTING, 2014, 7 (03): : 189 - 198
  • [40] Fault Detection and Correction Scheme using RC4 Stream Cipher
    Kiruba, S.
    Kirubaraj, A. Alfred
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 311 - 314