New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

被引:0
|
作者
Maitra, Subhamoy [1 ]
Paul, Goutam [2 ]
机构
[1] Indian Stat Inst, Appl Stat Unit, Kolkata 700108, India
[2] Jadavpur Univ, Dept Comp Engn & Sci, Kolkata 700032, India
来源
FAST SOFTWARE ENCRYPTION | 2008年 / 5086卷
关键词
Bias; Cryptanalysis; Keystream; Key Leakage; RC4; Stream Cipher;
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for small values of y, is biased towards some linear combination of the secret key bytes. In this paper, for the first time we show that the bias can be observed in S(S[y]] too. Based on this new form of permutation bias after the KSA and other related results, a complete framework is presented to show that many keystream output bytes of RC4 are significantly biased towards several linear combinations of the secret key bytes. The results do not assume any condition on the secret key. We find new biases in the initial as well as in the 256-th and 257-th keystream output bytes. For the first time biases at such later stages are discovered without any knowledge of the secret key bytes. We also identify that these biases propagate further, once the information for the index j is revealed.
引用
收藏
页码:253 / +
页数:4
相关论文
共 50 条
  • [41] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model
    Chen, Jiageng
    Miyaji, Atsuko
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 62 - 76
  • [42] The analysis of the number of fixed points in the key extending algorithm of RC4
    KeJian Xu
    Liang He
    ZhaoPeng Dai
    XiuBin Fan
    Science in China Series A: Mathematics, 2008, 51 : 407 - 415
  • [43] The analysis of the number of fixed points in the key extending algorithm of RC4
    Xu Kejian
    He Liang
    Dai Zhaopeng
    Fan Xiubin
    SCIENCE IN CHINA SERIES A-MATHEMATICS, 2008, 51 (03): : 407 - 415
  • [44] Some New Weaknesses in the RC4 Stream Cipher
    Lv, Jing
    Zhang, Bin
    Lin, Dongdai
    INFORMATION SECURITY APPLICATIONS, WISA 2013, 2014, 8267 : 28 - 38
  • [45] The analysis of the number of fixed points in the key extending algorithm of RC4
    XU KeJian~(1+) HE Liang~1 DAI ZhaoPeng~1 FAN XiuBin~2 1 College of Mathematics
    ScienceinChina(SeriesA:Mathematics), 2008, (03) : 407 - 415
  • [46] Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs
    Jana, Amit
    Paul, Goutam
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (03): : 479 - 508
  • [47] Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs
    Amit Jana
    Goutam Paul
    Cryptography and Communications, 2018, 10 : 479 - 508
  • [48] An approach of refining RC4 with performance analysis on new variants
    Suman Das
    Ranjan Ghosh
    Rajat Kumar Pal
    Sādhanā, 2019, 44
  • [49] RC4-Hash: A new hash function based on RC4 - (Extended abstract)
    Chang, Donghoon
    Gupta, Kishan Chand
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 80 - +
  • [50] An approach of refining RC4 with performance analysis on new variants
    Das, Suman
    Ghosh, Ranjan
    Pal, Rajat Kumar
    SADHANA-ACADEMY PROCEEDINGS IN ENGINEERING SCIENCES, 2019, 44 (11):