Statistical attacks on cookie masking for RC4

被引:0
|
作者
Kenneth G. Paterson
Jacob C. N. Schuldt
机构
[1] University of London,Royal Holloway
[2] AIST,undefined
来源
关键词
RC4 stream cipher; Statistical analysis; Masking; 94A60; 68P25;
D O I
暂无
中图分类号
学科分类号
摘要
Levillain et al. (Asia CCS 2015) proposed two cookie masking methods, TLS Scramble and MCookies, to counter a class of attacks on SSL/TLS in which the attacker is able to exploit its ability to obtain many encryptions of a target HTTP cookie. In particular, the masking methods potentially make it viable to continue to use the RC4 algorithm in SSL/TLS. In this paper, we provide a detailed analysis of TLS Scramble and MCookies when used in conjunction with RC4 in SSL/TLS. We show that, in fact, both are vulnerable to variants of the known attacks against RC4 in SSL/TLS exploiting the Mantin biases (Mantin, EUROCRYPT 2005): For the TLS Scramble mechanism, we provide a detailed statistical analysis coupled with extensive simulations that show that about 237 encryptions of the cookie are sufficient to enable its recovery.For the MCookies mechanism, our analysis is made more complex by the presence of a Base64 encoding step in the mechanism, which (unintentionally) acts like a classical block cipher S-box in the masking process. Despite this, we are able to develop a maximum likelihood analysis which provides a rigorous statistical procedure for estimating the unknown cookie. Based on simulations, we estimate that 245 encryptions of the cookie are sufficient to enable its recovery.
引用
收藏
页码:777 / 801
页数:24
相关论文
共 50 条
  • [1] Statistical attacks on cookie masking for RC4
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    [J]. CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 777 - 801
  • [2] Attacks on the RC4 stream cipher
    Andreas Klein
    [J]. Designs, Codes and Cryptography, 2008, 48 : 269 - 286
  • [3] Attacks on the RC4 stream cipher
    Klein, Andreas
    [J]. DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 269 - 286
  • [4] The effectiveness of brute force attacks on RC4
    Couture, N
    Kent, KB
    [J]. SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 333 - 336
  • [5] Statistical Attack on RC4 Distinguishing WPA
    Sepehrdad, Pouyan
    Vaudenay, Serge
    Vuagnoux, Martin
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 343 - 363
  • [6] RC4 stream cipher and possible attacks on WEP
    Stosic, Lazar
    Bogdanovic, Milena
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 110 - 114
  • [7] Predicting and distinguishing attacks on RC4 keystream generator
    Mantin, I
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 491 - 506
  • [8] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [9] Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
    Garman, Christina
    Paterson, Kenneth G.
    Van der Merwe, Thyla
    [J]. PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 113 - 128
  • [10] A Template Attack-Resistant Masking Scheme for RC4 Based on FPGA
    Zhang, Shaohui
    Wu, Liji
    Zhang, Xiangmin
    Wu, Xingjun
    Li, Xiangyu
    Fang, Huajun
    [J]. 2015 11TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS), 2015, : 381 - 384