New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

被引:0
|
作者
Maitra, Subhamoy [1 ]
Paul, Goutam [2 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
[2] Jadavpur Univ, Dept Comp Engn & Sci, Kolkata 700032, India
来源
FAST SOFTWARE ENCRYPTION | 2008年 / 5086卷
关键词
Bias; Cryptanalysis; Keystream; Key Leakage; RC4; Stream Cipher;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for small values of y, is biased towards some linear combination of the secret key bytes. In this paper, for the first time we show that the bias can be observed in S(S[y]] too. Based on this new form of permutation bias after the KSA and other related results, a complete framework is presented to show that many keystream output bytes of RC4 are significantly biased towards several linear combinations of the secret key bytes. The results do not assume any condition on the secret key. We find new biases in the initial as well as in the 256-th and 257-th keystream output bytes. For the first time biases at such later stages are discovered without any knowledge of the secret key bytes. We also identify that these biases propagate further, once the information for the index j is revealed.
引用
收藏
页码:253 / +
页数:4
相关论文
共 50 条
  • [1] On biases of permutation and keystream bytes of RC4 towards the secret key
    Paul, Goutam
    Maitra, Subhamoy
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2009, 1 (02): : 225 - 268
  • [2] On biases of permutation and keystream bytes of RC4 towards the secret key
    Goutam Paul
    Subhamoy Maitra
    Cryptography and Communications, 2009, 1 : 225 - 268
  • [3] Recovering RC4 permutation from 2048 keystream bytes if j is stuck
    Maitra, Subhamoy
    Paul, Goutarn
    INFORMATION SECURITY AND PRIVACY, 2008, 5107 : 306 - +
  • [4] Permutation after RC4 key scheduling reveals the secret key
    Paul, Goutam
    Maitra, Subhamoy
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 360 - +
  • [5] Generalization of Roos bias in RC4 and some results on key-keystream relations
    Dey, Sabyasachi
    Sarkar, Santanu
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2018, 12 (01) : 43 - 56
  • [6] On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
    Goutam Paul
    Siddheshwar Rathi
    Subhamoy Maitra
    Designs, Codes and Cryptography, 2008, 49 : 123 - 134
  • [7] On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
    Paul, Goutam
    Rathi, Siddheshwar
    Maitra, Subhamoy
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 49 (1-3) : 123 - 134
  • [8] Comprehensive Analysis of Initial Keystream Biases of RC4
    Isobe, Takanori
    Ohigashi, Toshihiro
    Watanabe, Yuhei
    Morii, Masakatu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2014, E97A (01) : 139 - 151
  • [9] Predicting and distinguishing attacks on RC4 keystream generator
    Mantin, I
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 491 - 506
  • [10] A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher
    Paul, S
    Preneel, B
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 245 - 259