Full Plaintext Recovery Attacks on RC4 Using Multiple Biases

被引:6
|
作者
Ohigashi, Toshihiro [1 ]
Isobe, Takanori [2 ]
Watanabe, Yuhei [2 ]
Morii, Masakatu [2 ]
机构
[1] Hiroshima Univ, Informat Media Ctr, Higashihiroshima 7398511, Japan
[2] Kobe Univ, Grad Sch Engn, Kobe, Hyogo 6578501, Japan
关键词
RC4; stream cipher; keystream biases; plaintext recovery attack; guess-and-determine attack; broadcast setting; KEYS;
D O I
10.1587/transfun.E98.A.81
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
RC4 is a widely-used stream cipher, adopted in many standard protocols, such as WEP, WPA and SSL/TLS, as a standard encryption algorithm. Isobe et al. proposed a plaintext recovery attack on RC4 in the broadcast setting, where the same plaintext is encrypted with different secret keys. Their attack is able to recover the first 257 bytes by exploiting the biases of the initial bytes of a keystream. In this paper, we propose two types of full plaintext recovery attacks that are able to recover all the bytes, even after the 258th byte, of a plaintext, unlike Isobe et al.'s attack. To achieve this, we combine the use of multiple keystream biases appropriately. The first attack utilizes the initial byte biases and Mantin's long-term bias. This attack can recover the first 1000 terabytes of a plaintext from 234 ciphertexts with a probability of almost one. The second attack is based on two long-term biases. Since this attack does not rely on the biases of the initial bytes of the RC4 keystream, it can recover any byte of a plaintext, even if the initial bytes are disregarded. Given 235 ciphertexts encrypted by different keys, any byte of a target plaintext can be recovered with a probability close to one.
引用
收藏
页码:81 / 91
页数:11
相关论文
共 50 条
  • [41] Securing Compressed Video Streams using RC4 Encryption Scheme
    Giradkar, Shrutika S.
    Bhattacharya, Antara
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 628 - 632
  • [42] Generalized Classes of Weak Keys on RC4 Using Predictive State
    Teramura, Ryoichi
    Ohigashi, Toshihiro
    Kuwakado, Hidenori
    Morii, Masakatu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 10 - 18
  • [43] Analysis of RC4 Crypts Using PSO Based Swarm Technique
    Din, Maiya
    Pal, Saibal K.
    Muttoo, S. K.
    HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 1049 - 1056
  • [44] Big Bias Hunting in Amazonia: Large-Scale Computation and Exploitation of RC4 Biases (Invited Paper)
    Paterson, Kenneth G.
    Poettering, Bertram
    Schuldt, Jacob C. N.
    ADVANCES IN CRYPTOLOGY - ASIACRYPT 2014, PT I, 2014, 8873 : 398 - 419
  • [45] A Steganographic Technique Based on VLSB Method using RC4 Stream Cipher
    Bardhan, Osmita
    Bhattacharya, Ansuman
    Sinha, Bhabani P.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1402 - 1407
  • [46] Audio Steganography Technique using DCT-SWT with RC4 Encryption
    Octafian, Moch Rafi Nur
    Novamizanti, Ledya
    Safitri, Irma
    Sitepu, Richardo Praystihan
    2022 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ITS APPLICATIONS (ICODSA), 2022, : 35 - 40
  • [47] Solving for the RC4 stream cipher state register using a genetic algorithm
    Ferriman, Benjamin
    Obimbo, Charlie
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2014, 5 (05) : 216 - 223
  • [48] New Correlations of RC4 PRGA Using Nonzero-Bit Differences
    Miyaji, Atsuko
    Sukegawa, Masahiro
    INFORMATION SECURITY AND PRIVACY, PROCEEDINGS, 2009, 5594 : 134 - 152
  • [49] PARC4: High Performance Implementation of RC4 Cryptographic Algorithm using Parallelism
    Handa, Disha
    Kapoor, Bhanu
    PROCEEDINGS OF THE 2014 INTERNATIONAL CONFERENCE ON RELIABILTY, OPTIMIZATION, & INFORMATION TECHNOLOGY (ICROIT 2014), 2014, : 286 - 289
  • [50] A Novel Color Image Encryption Algorithm Using Chaotic Map and Improved RC4
    Jin, Cong
    Tu, Zhengwu
    AUTOMATION CONTROL THEORY PERSPECTIVES IN INTELLIGENT SYSTEMS, 2016, 466 : 3 - 14