The effectiveness of brute force attacks on RC4

被引:5
|
作者
Couture, N [1 ]
Kent, KB [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
关键词
D O I
10.1109/DNSR.2004.1344747
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. The RC4 cipher, utilized primarily in the area of data communications, is being used in this paper as a test case for determining the effectiveness of exhaustive key-searches implemented on FPGAs using a Network on Chip (NoC) design architecture. Preliminary results show that a network of key-checker units implemented on a Xilinx XC2V1000 FPGA using the Celoxica DK2 design tools can exploit the speed and parallelism of hardware such that the entire key-space of a 40-bit RC4 encryption can be searched in minutes. Furthermore, it has been found that the clock rate of the circuit diminishes as the number of key-checker units increases. Future work is proposed to find a method for predicting an optimal balance between the size of the network (# of key-checker units) and the clock rate in order to maximize performance.
引用
收藏
页码:333 / 336
页数:4
相关论文
共 50 条
  • [41] Protecting financial institutions from brute-force attacks
    Herley, Cormac
    Florencio, Dinei
    [J]. PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 681 - 685
  • [42] RC4 Algorithm Visualization for Cryptography Education
    Sriadhi, S.
    Rahim, Robbi
    Ahmar, Ansari Saleh
    [J]. 2ND INTERNATIONAL CONFERENCE ON STATISTICS, MATHEMATICS, TEACHING, AND RESEARCH 2017, 2018, 1028
  • [43] A new variant of RC4 stream cipher
    Khine, Lae Lae
    [J]. World Academy of Science, Engineering and Technology, 2009, 38 : 1049 - 1052
  • [44] Settling the mystery of Zr = r in RC4
    Dey, Sabyasachi
    Sarkar, Santanu
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (04): : 697 - 715
  • [45] An approach to assess the optimality of refining RC4
    Das, Suman
    Dey, Hemanta
    Ghosh, Ranjan
    [J]. 2015 THIRD INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT), 2015,
  • [46] Key Collisions of the RC4 Stream Cipher
    Matsui, Mitsuru
    [J]. FAST SOFTWARE ENCRYPTION, 2009, 5665 : 38 - 50
  • [47] Analysing and exploiting the Mantin biases in RC4
    Remi Bricout
    Sean Murphy
    Kenneth G. Paterson
    Thyla van der Merwe
    [J]. Designs, Codes and Cryptography, 2018, 86 : 743 - 770
  • [48] 流密码与RC4算法
    宋维平
    [J]. 吉林师范大学学报(自然科学版), 2005, (02) : 71 - 72
  • [49] Analysing and exploiting the Mantin biases in RC4
    Bricout, Remi
    Murphy, Sean
    Paterson, Kenneth G.
    van der Merwe, Thyla
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2018, 86 (04) : 743 - 770
  • [50] New state recovery attack on RC4
    Maximov, Alexander
    Khovratovich, Dmitry
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO 2008, PROCEEDINGS, 2008, 5157 : 297 - 316