On biases of permutation and keystream bytes of RC4 towards the secret key

被引:5
|
作者
Paul, Goutam [1 ]
Maitra, Subhamoy [2 ]
机构
[1] Jadavpur Univ, Dept Comp Sci & Engn, Kolkata 700032, India
[2] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
关键词
Bias; Cryptanalysis; Keystream; Key leakage; Permutation; RC4; Stream cipher; ATTACKS; STATE;
D O I
10.1007/s12095-008-0009-4
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in this paper, where the nonlinear operation is swapping among the permutation bytes. Explicit formulae are provided for the probabilities with which the permutation bytes at any stage of the KSA are biased to the secret key. Theoretical proofs of these formulae have been left open since Roos' work (1995). Next, a generalization of the RC4 KSA is analyzed corresponding to a class of update functions of the indices involved in the swaps. This reveals an inherent weakness of shuffle-exchange kind of key scheduling. Moreover, we show that biases towards the secret key also exist in S[S[y]], S[S[S[y]]], and so on, for initial values of y. We additionally show that each byte of S-N actually reveals secret key information. Looking at all the elements of the final permutation S-N and its inverse S-N(-1), the value of the hidden index j in each round of the KSA can be estimated from a "pair of values" in 0, ... , N - 1 with a constant probability of success pi = N-2/N . (N-1/N)(N-1) + 2/N (we get pi approximate to 0.37, for N = 256), which is significantly higher than the random association. Using the values of two consecutive j's, we estimate the y-th key byte from at most a "quadruple of values" in 0, ... , N - 1 with a probability > 0.12. As a secret key of l bytes is repeated at least [N/l] times in RC4, these many quadruples can be accumulated to get each byte of the secret key with very high probability (e. g., 0.8 to close to 1) from a small set of values. Based on our analysis of the key scheduling, we show that the secret key of RC4 can be recovered from the state information in a time much less than the exhaustive search with good probability. Finally, based on the above biases of the permutation after the KSA and other related results, a complete framework is presented to show that many keystream output bytes of RC4 are significantly biased towards several linear combinations of the secret key bytes. The results do not assume any condition on the secret key. We find new biases in the initial as well as in the 256-th and 257-th keystream output bytes.
引用
收藏
页码:225 / 268
页数:44
相关论文
共 50 条
  • [31] Proving TLS-attack related open biases of RC4
    Sarkar, Santanu
    Sen Gupta, Sourav
    Paul, Goutam
    Maitra, Subhamoy
    DESIGNS CODES AND CRYPTOGRAPHY, 2015, 77 (01) : 231 - 253
  • [32] Proving TLS-attack related open biases of RC4
    Santanu Sarkar
    Sourav Sen Gupta
    Goutam Paul
    Subhamoy Maitra
    Designs, Codes and Cryptography, 2015, 77 : 231 - 253
  • [33] How to Find Short RC4 Colliding Key Pairs
    Chen, Jiageng
    Miyaji, Atsuko
    INFORMATION SECURITY, 2011, 7001 : 32 - 46
  • [34] New weakness in the key-scheduling algorithm of RC4
    Ohigashi, Toshihiro
    Shiraishi, Yoshiaki
    Morii, Masakatu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2008, E91A (01) : 3 - 11
  • [35] How to Efficiently Exploit Different Types of Biases for Plaintext Recovery of RC4
    Watanabe, Yuhei
    Isobe, Takanori
    Ohigashi, Toshihiro
    Morii, Masakatu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2017, E100A (03) : 803 - 810
  • [36] Generalized Analysis on Key Collisions of Stream Cipher RC4
    Chen, Jiageng
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (11) : 2194 - 2206
  • [37] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [38] Refined RC4 Key Correlations of Internal States in WPA
    Ito, Ryoma
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (06) : 1132 - 1144
  • [39] Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher
    Jha, Sonu
    Banik, Subhadeep
    Isobe, Takanori
    Ohigashi, Toshihiro
    Sarkar, Santanu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (11) : 1869 - 1879
  • [40] The analysis of the number of fixed points in the key extending algorithm of RC4
    KeJian Xu
    Liang He
    ZhaoPeng Dai
    XiuBin Fan
    Science in China Series A: Mathematics, 2008, 51 : 407 - 415