New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

被引:0
|
作者
Maitra, Subhamoy [1 ]
Paul, Goutam [2 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
[2] Jadavpur Univ, Dept Comp Engn & Sci, Kolkata 700032, India
来源
FAST SOFTWARE ENCRYPTION | 2008年 / 5086卷
关键词
Bias; Cryptanalysis; Keystream; Key Leakage; RC4; Stream Cipher;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for small values of y, is biased towards some linear combination of the secret key bytes. In this paper, for the first time we show that the bias can be observed in S(S[y]] too. Based on this new form of permutation bias after the KSA and other related results, a complete framework is presented to show that many keystream output bytes of RC4 are significantly biased towards several linear combinations of the secret key bytes. The results do not assume any condition on the secret key. We find new biases in the initial as well as in the 256-th and 257-th keystream output bytes. For the first time biases at such later stages are discovered without any knowledge of the secret key bytes. We also identify that these biases propagate further, once the information for the index j is revealed.
引用
收藏
页码:253 / +
页数:4
相关论文
共 50 条
  • [31] How to Find Short RC4 Colliding Key Pairs
    Chen, Jiageng
    Miyaji, Atsuko
    INFORMATION SECURITY, 2011, 7001 : 32 - 46
  • [32] A new variant of RC4 stream cipher
    Khine, Lae Lae
    World Academy of Science, Engineering and Technology, 2009, 38 : 1049 - 1052
  • [33] New state recovery attack on RC4
    Maximov, Alexander
    Khovratovich, Dmitry
    ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 297 - 316
  • [34] Generalized Analysis on Key Collisions of Stream Cipher RC4
    Chen, Jiageng
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (11) : 2194 - 2206
  • [35] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [36] Refined RC4 Key Correlations of Internal States in WPA
    Ito, Ryoma
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (06) : 1132 - 1144
  • [37] Discovery and Exploitation of New Biases in RC4
    Sepehrdad, Pouyan
    Vaudenay, Serge
    Vuagnoux, Martin
    SELECTED AREAS IN CRYPTOGRAPHY, 2011, 6544 : 74 - 91
  • [38] Further clarification on Mantin’s Digraph Repetition Bias in RC4
    Pranab Chakraborty
    Subhamoy Maitra
    Designs, Codes and Cryptography, 2021, 89 : 127 - 141
  • [39] Further clarification on Mantin's Digraph Repetition Bias in RC4
    Chakraborty, Pranab
    Maitra, Subhamoy
    DESIGNS CODES AND CRYPTOGRAPHY, 2021, 89 (01) : 127 - 141
  • [40] New Iterated RC4 Key Correlations and their Application to Plaintext Recovery on WPA-TKIP
    Ito, Ryoma
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2021, E104A (01) : 190 - 202