Attacks on the RC4 stream cipher

被引:0
|
作者
Andreas Klein
机构
[1] Ghent University,Department of Pure Mathematics and Computer Algebra
来源
关键词
Cryptanalysis; Stream cipher; RC4; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described by Fluhrer, Mantin, Shamir (In: Selected Areas in Cryptography, 2001) in such a way, that it will work, if the weak keys described in that paper are avoided. A further attack will work even if the first 256 Byte of the output remain unused. Finally we show that variants of the RC4 algorithm like NGG and RC4A are also vulnerable by these techniques.
引用
收藏
页码:269 / 286
页数:17
相关论文
共 50 条
  • [31] A Novel Image Encryption Scheme Based on Intertwining Chaotic Maps and RC4 Stream Cipher
    Kumari, Manju
    Gupta, Shailender
    3D RESEARCH, 2018, 9 (01)
  • [32] Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers
    Maximov, A
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 342 - 358
  • [33] Cryptography using Random Rc4 Stream Cipher on SMS for Android-Based Smartphones
    Rifki, Rifki
    Septiarini, Anindita
    Hatta, Heliza Rahmania
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2018, 9 (12) : 89 - 93
  • [34] SECURITY EVALUATION AND ENCRYPTION EFFICIENCY ANALYSIS OF RC4 STREAM CIPHER FOR CONVERGED NETWORK APPLICATIONS
    Riad, Alaa E. Din
    Elminir, Hamdy K.
    Shehata, Alaa R.
    Ibrahim, Taha R.
    JOURNAL OF ELECTRICAL ENGINEERING-ELEKTROTECHNICKY CASOPIS, 2013, 64 (03): : 196 - 200
  • [35] The analysis and realization of RC4 stream ciphers
    Zhuang, Peidong
    Ding, Qun
    Wang, Lu
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 4, 2009, : 448 - 452
  • [36] Statistical attacks on cookie masking for RC4
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 777 - 801
  • [37] The effectiveness of brute force attacks on RC4
    Couture, N
    Kent, KB
    SECOND ANNUAL CONFERENCE ON COMMUNICATION NETWORKS AND SERVICES RESEARCH, PROCEEDINGS, 2004, : 333 - 336
  • [38] Statistical attacks on cookie masking for RC4
    Kenneth G. Paterson
    Jacob C. N. Schuldt
    Cryptography and Communications, 2018, 10 : 777 - 801
  • [39] LT Code Design Based on RC4 Sequential Cipher
    Xing, Yanling
    Pei, Yukui
    Ge, Ning
    PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 1154 - 1158
  • [40] (Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher
    Sourav Sen Gupta
    Subhamoy Maitra
    Goutam Paul
    Santanu Sarkar
    Journal of Cryptology, 2014, 27 : 67 - 108