Passive-only key recovery attacks on RC4

被引:0
|
作者
Vaudenay, Serge [1 ]
Vuagnoux, Martin [1 ]
机构
[1] Ecole Polytech Fed Lausanne, CH-1015 Lausanne, Switzerland
来源
关键词
RC4; stream cipher; cryptanalysis; key related attack; WEP;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector - a cryptographic scheme typically used by the WEP and WPA protocols to protect IEEE 802.11 wireless communications. First, we show how the previously discovered key recovery attacks can be improved by reducing the dependency between the secret key bytes. Then, we describe two new weaknesses related to the modulo operation of the key scheduling algorithm. Finally, we describe a passive-only attack able to significantly improve the key recovery process on WEP with a data complexity of 2(15) eavesdropped packets.
引用
收藏
页码:344 / 359
页数:16
相关论文
共 50 条
  • [1] Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
    Garman, Christina
    Paterson, Kenneth G.
    Van der Merwe, Thyla
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 113 - 128
  • [2] Full Plaintext Recovery Attacks on RC4 Using Multiple Biases
    Ohigashi, Toshihiro
    Isobe, Takanori
    Watanabe, Yuhei
    Morii, Masakatu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 81 - 91
  • [3] Attacks on the RC4 stream cipher
    Andreas Klein
    [J]. Designs, Codes and Cryptography, 2008, 48 : 269 - 286
  • [4] Attacks on the RC4 stream cipher
    Klein, Andreas
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 269 - 286
  • [5] Statistical attacks on cookie masking for RC4
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 777 - 801
  • [6] The effectiveness of brute force attacks on RC4
    Couture, N
    Kent, KB
    [J]. SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 333 - 336
  • [7] Statistical attacks on cookie masking for RC4
    Kenneth G. Paterson
    Jacob C. N. Schuldt
    [J]. Cryptography and Communications, 2018, 10 : 777 - 801
  • [8] RC4 stream cipher and possible attacks on WEP
    Stosic, Lazar
    Bogdanovic, Milena
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 110 - 114
  • [9] Predicting and distinguishing attacks on RC4 keystream generator
    Mantin, I
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 491 - 506
  • [10] Key Collisions of the RC4 Stream Cipher
    Matsui, Mitsuru
    [J]. FAST SOFTWARE ENCRYPTION, 2009, 5665 : 38 - 50