The effectiveness of brute force attacks on RC4

被引:5
|
作者
Couture, N [1 ]
Kent, KB [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
关键词
D O I
10.1109/DNSR.2004.1344747
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. The RC4 cipher, utilized primarily in the area of data communications, is being used in this paper as a test case for determining the effectiveness of exhaustive key-searches implemented on FPGAs using a Network on Chip (NoC) design architecture. Preliminary results show that a network of key-checker units implemented on a Xilinx XC2V1000 FPGA using the Celoxica DK2 design tools can exploit the speed and parallelism of hardware such that the entire key-space of a 40-bit RC4 encryption can be searched in minutes. Furthermore, it has been found that the clock rate of the circuit diminishes as the number of key-checker units increases. Future work is proposed to find a method for predicting an optimal balance between the size of the network (# of key-checker units) and the clock rate in order to maximize performance.
引用
收藏
页码:333 / 336
页数:4
相关论文
共 50 条
  • [1] GB-RC4: Effective brute force attacks on RC4 algorithm using GPU
    Xue, Pei
    Li, Tao
    Dong, Han
    Liu, Chunbo
    Ma, Wenjing
    Pei, Songwen
    [J]. 2016 SEVENTH INTERNATIONAL GREEN AND SUSTAINABLE COMPUTING CONFERENCE (IGSC), 2016,
  • [2] Effective uses of FPGAs for brute-force attack on RC4 ciphers
    Kwok, Sammy H. M.
    Lam, Edmund Y.
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2008, 16 (08) : 1096 - 1100
  • [3] Attacks on the RC4 stream cipher
    Andreas Klein
    [J]. Designs, Codes and Cryptography, 2008, 48 : 269 - 286
  • [4] Attacks on the RC4 stream cipher
    Klein, Andreas
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 269 - 286
  • [5] Statistical attacks on cookie masking for RC4
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 777 - 801
  • [6] Statistical attacks on cookie masking for RC4
    Kenneth G. Paterson
    Jacob C. N. Schuldt
    [J]. Cryptography and Communications, 2018, 10 : 777 - 801
  • [7] RC4 stream cipher and possible attacks on WEP
    Stosic, Lazar
    Bogdanovic, Milena
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 110 - 114
  • [8] Predicting and distinguishing attacks on RC4 keystream generator
    Mantin, I
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 491 - 506
  • [9] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [10] Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
    Garman, Christina
    Paterson, Kenneth G.
    Van der Merwe, Thyla
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 113 - 128