Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS

被引:0
|
作者
Garman, Christina [1 ]
Paterson, Kenneth G. [2 ]
Van der Merwe, Thyla [2 ]
机构
[1] Johns Hopkins Univ, Baltimore, MD 21218 USA
[2] Royal Holloway Univ London, London, England
基金
英国工程与自然科学研究理事会;
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Despite recent high-profile attacks on the RC4 algorithm in TLS, its usage is still running at about 30% of all TLS traffic. We provide new attacks against RC4 in TLS that are focussed on recovering user passwords, still the pre-eminent means of user authentication on the Internet today. Our new attacks use a generally applicable Bayesian inference approach to transform a priori information about passwords in combination with gathered ciphertexts into a posteriori likelihoods for passwords. We report on extensive simulations of the attacks. We also report on a "proof of concept" implementation of the attacks for a specific application layer protocol, namely BasicAuth. Our work validates the truism that attacks only get better with time: we obtain good success rates in recovering user passwords with 2(26) encryptions, whereas the previous generation of attacks required around 2(34) encryptions to recover an HTTP session cookie.
引用
收藏
页码:113 / 128
页数:16
相关论文
共 50 条
  • [1] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [2] Attacks on the RC4 stream cipher
    Andreas Klein
    [J]. Designs, Codes and Cryptography, 2008, 48 : 269 - 286
  • [3] Attacks on the RC4 stream cipher
    Klein, Andreas
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 269 - 286
  • [4] Full Plaintext Recovery Attacks on RC4 Using Multiple Biases
    Ohigashi, Toshihiro
    Isobe, Takanori
    Watanabe, Yuhei
    Morii, Masakatu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 81 - 91
  • [5] An analysis of the RC4 family of stream ciphers against algebraic attacks
    Wong, Kenneth Koon-Ho
    Carter, Gary
    Dawson, Ed
    [J]. Conferences in Research and Practice in Information Technology Series, 2010, 105 : 67 - 74
  • [6] Statistical attacks on cookie masking for RC4
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 777 - 801
  • [7] The effectiveness of brute force attacks on RC4
    Couture, N
    Kent, KB
    [J]. SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 333 - 336
  • [8] Statistical attacks on cookie masking for RC4
    Kenneth G. Paterson
    Jacob C. N. Schuldt
    [J]. Cryptography and Communications, 2018, 10 : 777 - 801
  • [9] RC4 stream cipher and possible attacks on WEP
    Stosic, Lazar
    Bogdanovic, Milena
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 110 - 114
  • [10] Predicting and distinguishing attacks on RC4 keystream generator
    Mantin, I
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 491 - 506