Some Combinatorial Results towards State Recovery Attack on RC4

被引:0
|
作者
Das, Apurba [1 ]
Maitra, Subhamoy [1 ]
Paul, Goutam [2 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
[2] Univ Jadavpur, Dept Comp Sci & Engn, Kolkata 700032, W Bengal, India
来源
INFORMATION SYSTEMS SECURITY | 2011年 / 7093卷
关键词
Cryptanalysis; RC4; State Recovery Attack; Stream Cipher;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A stream cipher has an unobservable internal state that is updated in every step and a keystream output (bit or word) is generated at every state transition. State recovery attack on stream cipher attempts to recover the hidden internal state by observing the keystream. RC4 is a very widely used commercial stream cipher that has a huge internal state. No known state recovery attack on RC4 is feasible in practice and the best so far has a complexity of 2(241) (Maximov et al., CRYPTO 2008). In this paper, we take a different approach to the problem. RC4 has a secret index j of size one byte. We perform a combinatorial analysis of the complexity of RC4 state recovery under the assumption that the values of j are known for several rounds. This assumption of knowledge of j is reasonable under some attack models, such as fault analysis, cache analysis, side channel attacks etc. Our objective is not to devise an unconditional full state recovery attack on RC4, but to investigate how much information of j leaks how much information of the internal state. In the process, we reveal a nice combinatorial structure of RCA evolution and establish certain interesting results related to the complexity of state recovery.
引用
收藏
页码:204 / +
页数:2
相关论文
共 45 条
  • [1] New state recovery attack on RC4
    Maximov, Alexander
    Khovratovich, Dmitry
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 297 - 316
  • [2] Full Plaintext Recovery Attack on Broadcast RC4
    Isobe, Takanori
    Ohigashi, Toshihiro
    Watanabe, Yuhei
    Morii, Masakatu
    FAST SOFTWARE ENCRYPTION (FSE 2013), 2014, 8424 : 179 - 202
  • [3] A practical attack on broadcast RC4
    Mantin, I
    Shamir, A
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 152 - 164
  • [4] Attack on Broadcast RC4 Revisited
    Maitra, Subhamoy
    Paul, Goutam
    Sen Gupta, Sourav
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 199 - 217
  • [5] Statistical Attack on RC4 Distinguishing WPA
    Sepehrdad, Pouyan
    Vaudenay, Serge
    Vuagnoux, Martin
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 343 - 363
  • [6] A practical attack on the fixed RC4 in the WEP mode
    Mantin, I
    ADVANCES IN CRYPTOLOGY ASIACRYPT 2005, 2005, 3788 : 395 - 411
  • [7] RC4 State and Its Applications
    Yu, Qian
    Zhang, Chang N.
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 264 - 269
  • [8] ANN Based Distinguishing Attack on RC4 Stream Cipher
    Bhateja, Ashok K.
    Din, Maiya
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONFERENCE ON BIO-INSPIRED COMPUTING: THEORIES AND APPLICATIONS (BIC-TA 2012), VOL 2, 2013, 202 : 101 - 109
  • [9] Performance Analysis of RC4 and Some of Its Variants
    Das, Suman
    Dey, Hemanta
    Ghosh, Ranjan
    INFORMATION SYSTEMS DESIGN AND INTELLIGENT APPLICATIONS, VOL 1, 2015, 339 : 259 - 268
  • [10] RC4: Non-randomness in the Index j and Some Results on Its Cycles
    Chakraborty, Chandratop
    Chakraborty, Pranab
    Maitra, Subhamoy
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2019, 2019, 11898 : 95 - 114