Some Combinatorial Results towards State Recovery Attack on RC4

被引:0
|
作者
Das, Apurba [1 ]
Maitra, Subhamoy [1 ]
Paul, Goutam [2 ]
Sarkar, Santanu [1 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
[2] Univ Jadavpur, Dept Comp Sci & Engn, Kolkata 700032, W Bengal, India
来源
INFORMATION SYSTEMS SECURITY | 2011年 / 7093卷
关键词
Cryptanalysis; RC4; State Recovery Attack; Stream Cipher;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
A stream cipher has an unobservable internal state that is updated in every step and a keystream output (bit or word) is generated at every state transition. State recovery attack on stream cipher attempts to recover the hidden internal state by observing the keystream. RC4 is a very widely used commercial stream cipher that has a huge internal state. No known state recovery attack on RC4 is feasible in practice and the best so far has a complexity of 2(241) (Maximov et al., CRYPTO 2008). In this paper, we take a different approach to the problem. RC4 has a secret index j of size one byte. We perform a combinatorial analysis of the complexity of RC4 state recovery under the assumption that the values of j are known for several rounds. This assumption of knowledge of j is reasonable under some attack models, such as fault analysis, cache analysis, side channel attacks etc. Our objective is not to devise an unconditional full state recovery attack on RC4, but to investigate how much information of j leaks how much information of the internal state. In the process, we reveal a nice combinatorial structure of RCA evolution and establish certain interesting results related to the complexity of state recovery.
引用
收藏
页码:204 / +
页数:2
相关论文
共 45 条
  • [21] Finding an internal state of RC4 stream cipher
    Tomasevic, Violeta
    Bojanic, Slobodan
    Nieto-Taladriz, Octavio
    INFORMATION SCIENCES, 2007, 177 (07) : 1715 - 1727
  • [22] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [23] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model
    Chen, Jiageng
    Miyaji, Atsuko
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 62 - 76
  • [24] Analysis of burn-in period for RC4 state transition
    Goutam Paul
    Souvik Ray
    Cryptography and Communications, 2018, 10 : 881 - 908
  • [25] A Template Attack-Resistant Masking Scheme for RC4 Based on FPGA
    Zhang, Shaohui
    Wu, Liji
    Zhang, Xiangmin
    Wu, Xingjun
    Li, Xiangyu
    Fang, Huajun
    2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 381 - 384
  • [26] Some Proofs of Joint Distributions of Keystream Biases in RC4
    Jha, Sonu
    Banik, Subhadeep
    Isobe, Takanori
    Ohigashi, Toshihiro
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2016, 2016, 10095 : 305 - 321
  • [27] Effective uses of FPGAs for brute-force attack on RC4 ciphers
    Kwok, Sammy H. M.
    Lam, Edmund Y.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2008, 16 (08) : 1096 - 1100
  • [28] Internal-state reconstruction of a stream cipher RC4
    Shiraishi, Y
    Ohigashi, T
    Morii, M
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2003, E86A (10) : 2636 - 2638
  • [29] Analysis of burn-in period for RC4 state transition
    Paul, Goutam
    Ray, Souvik
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 881 - 908
  • [30] On biases of permutation and keystream bytes of RC4 towards the secret key
    Goutam Paul
    Subhamoy Maitra
    Cryptography and Communications, 2009, 1 : 225 - 268