Some New Weaknesses in the RC4 Stream Cipher

被引:0
|
作者
Lv, Jing [1 ]
Zhang, Bin [1 ]
Lin, Dongdai [2 ]
机构
[1] Chinese Acad Sci, Inst Software, Lab Trusted Comp & Informat Assurance, Beijing 100190, Peoples R China
[2] Chinese Acad Sci, Inst Informat Engn, State Key Lab Informat Secur, Beijing 100190, Peoples R China
关键词
RC4; Broadcast RC4; Ciphertext only attack; Distinguishing attack; State recovery attack; KEYSTREAM GENERATOR; ATTACK;
D O I
10.1007/978-3-319-05149-9_2
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In FSE 2011, Maitra and Paul observed that there exists negative bias in the first byte of the RC4 keystream towards 0. In this paper, we give our theoretical proof of this bias. This bias immediately provide distinguisher for RC4, and ciphertext only attack on broadcast RC4. Additionally, we discover some new weaknesses of the keystream bytes even after the first N rounds of the PRGA, where N is the size of the RC4 permutation, generally, N = 256. The weaknesses in turn provide us with certain state information from the keystream bytes no matter how many initial bytes are thrown away.
引用
收藏
页码:28 / 38
页数:11
相关论文
共 50 条
  • [1] Attacks on the RC4 stream cipher
    Andreas Klein
    [J]. Designs, Codes and Cryptography, 2008, 48 : 269 - 286
  • [2] An Effective RC4 Stream Cipher
    Weerasinghe, T. D. B.
    [J]. 2013 8TH IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2013, : 69 - 74
  • [3] Attacks on the RC4 stream cipher
    Klein, Andreas
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 269 - 286
  • [4] Key Collisions of the RC4 Stream Cipher
    Matsui, Mitsuru
    [J]. FAST SOFTWARE ENCRYPTION, 2009, 5665 : 38 - 50
  • [5] Hardware implementation of the RC4 stream cipher
    Kitsos, P
    Kostopoulos, G
    Sklavos, N
    Koufopavlou, O
    [J]. PROCEEDINGS OF THE 46TH IEEE INTERNATIONAL MIDWEST SYMPOSIUM ON CIRCUITS & SYSTEMS, VOLS 1-3, 2003, : 1363 - 1366
  • [6] RC4 stream cipher and possible attacks on WEP
    Stosic, Lazar
    Bogdanovic, Milena
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 110 - 114
  • [7] Finding an internal state of RC4 stream cipher
    Tomasevic, Violeta
    Bojanic, Slobodan
    Nieto-Taladriz, Octavio
    [J]. INFORMATION SCIENCES, 2007, 177 (07) : 1715 - 1727
  • [8] Reducing the state space of RC4 stream cipher
    Tomasevic, V
    Bojanic, S
    [J]. COMPUTATIONAL SCIENCE - ICCS 2004, PT 1, PROCEEDINGS, 2004, 3036 : 644 - 647
  • [9] Theoretical Understanding of Some Conditional and Joint Biases in RC4 Stream Cipher
    Jha, Sonu
    Banik, Subhadeep
    Isobe, Takanori
    Ohigashi, Toshihiro
    Sarkar, Santanu
    [J]. IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2018, E101A (11) : 1869 - 1879
  • [10] ANN Based Distinguishing Attack on RC4 Stream Cipher
    Bhateja, Ashok K.
    Din, Maiya
    [J]. PROCEEDINGS OF SEVENTH INTERNATIONAL CONFERENCE ON BIO-INSPIRED COMPUTING: THEORIES AND APPLICATIONS (BIC-TA 2012), VOL 2, 2013, 202 : 101 - 109