New weakness in the key-scheduling algorithm of RC4

被引:7
|
作者
Ohigashi, Toshihiro [1 ]
Shiraishi, Yoshiaki [2 ]
Morii, Masakatu [3 ]
机构
[1] Kobe Univ, Grad Sch Sci & Technol, Kobe, Hyogo 6578501, Japan
[2] Nagoya Inst Technol, Dept Comp Sci & Engn, Nagoya, Aichi 4668555, Japan
[3] Kobe Univ, Fac Engn, Dept Elect & Elect Engn, Kobe, Hyogo 6578501, Japan
关键词
cryptanalysis; stream cipher; RC4; key scheduling algorithm;
D O I
10.1093/ietfec/e91-a.1.3
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
In a key scheduling algorithm (KSA) of stream ciphers, a secret key is expanded into a large initial state. An internal state reconstruction method is known as a general attack against stream ciphers; it recovers the initial state from a given pair of plaintext and ciphertext more efficiently than exhaustive key search. If the method succeeds, then it is desirable that the inverse of KSA is infeasible in order to avoid the leakage of the secret key information. This paper shows that it is easy to compute a secret key from an initial state of RC4. We propose a method to recover an l-bit secret key from only the first l bits of the initial state of RC4 using linear equations with the time complexity less than that of one execution of KSA. It can recover the secret keys of which number is 2(103.6) when the size of the secret key is 128 bits. That is, the 128-bit secret key can be recovered with a high probability when the first 128 bits of the initial state are determined using the internal state reconstruction method.
引用
收藏
页码:3 / 11
页数:9
相关论文
共 50 条
  • [1] KSAm - An Improved RC4 Key-Scheduling Algorithm for Securing WEP
    Crainicu, Bogdan
    Boian, Florian Mircea
    NOVEL ALGORITHMS AND TECHNIQUES IN TELECOMMUNICATIONS AND NETWORKING, 2010, : 391 - 396
  • [2] New Results on the Key Scheduling Algorithm of RC4
    Akguen, Mete
    Kavak, Pinar
    Demirci, Hueseyin
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 40 - 52
  • [3] Securing WEP Cryptosystems through A New RC4 Key Scheduling Algorithm
    Crainicu, Bogdan
    Iantovics, Barna Laszlo
    COMPLEXITY IN ARTIFICIAL AND NATURAL SYSTEMS, PROCEEDINGS, 2008, : 93 - 99
  • [4] Revisiting (nested) Roos bias in RC4 key scheduling algorithm
    Santanu Sarkar
    Ayineedi Venkateswarlu
    Designs, Codes and Cryptography, 2017, 82 : 131 - 148
  • [5] Revisiting (nested) Roos bias in RC4 key scheduling algorithm
    Sarkar, Santanu
    Venkateswarlu, Ayineedi
    DESIGNS CODES AND CRYPTOGRAPHY, 2017, 82 (1-2) : 131 - 148
  • [6] Results on significant anomalies of state values after key scheduling algorithm in RC4
    Sarkar, Santanu
    IET INFORMATION SECURITY, 2017, 11 (05) : 267 - 272
  • [7] Permutation after RC4 key scheduling reveals the secret key
    Paul, Goutam
    Maitra, Subhamoy
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 360 - +
  • [8] New Iterated RC4 Key Correlations
    Ito, Ryoma
    Miyaji, Atsuko
    INFORMATION SECURITY AND PRIVACY, 2018, 10946 : 154 - 171
  • [9] On non-randomness of the permutation after RC4 key scheduling
    Paul, Coutam
    Maitra, Subhamoy
    Srivastava, Rohit
    APPLIED ALGEBRA, ALGEBRAIC ALGORITHMS AND ERROR-CORRECTING CODES, PROCEEDINGS, 2007, 4851 : 100 - +
  • [10] The analysis of the number of fixed points in the key extending algorithm of RC4
    KeJian Xu
    Liang He
    ZhaoPeng Dai
    XiuBin Fan
    Science in China Series A: Mathematics, 2008, 51 : 407 - 415