Attacks on the RC4 stream cipher

被引:0
|
作者
Andreas Klein
机构
[1] Ghent University,Department of Pure Mathematics and Computer Algebra
来源
关键词
Cryptanalysis; Stream cipher; RC4; 68P25; 94A60;
D O I
暂无
中图分类号
学科分类号
摘要
In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described by Fluhrer, Mantin, Shamir (In: Selected Areas in Cryptography, 2001) in such a way, that it will work, if the weak keys described in that paper are avoided. A further attack will work even if the first 256 Byte of the output remain unused. Finally we show that variants of the RC4 algorithm like NGG and RC4A are also vulnerable by these techniques.
引用
收藏
页码:269 / 286
页数:17
相关论文
共 50 条
  • [41] High-speed secure stream cipher using synchronized chaos and the RC4 algorithm for optical communications
    Xue, Chenpeng
    Zheng, Likai
    Wang, Xu
    Zhu, Beibei
    Zhang, Zuxing
    Hong, Yanhua
    OPTICS EXPRESS, 2025, 33 (01): : 488 - 500
  • [42] An Efficient Image Encryption Scheme Based on a Peter De Jong Chaotic Map and a RC4 Stream Cipher
    Hanchinamani, Gururaj
    Kulkarni, Linganagouda
    3D RESEARCH, 2015, 6 (03)
  • [43] A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model
    Chen, Jiageng
    Miyaji, Atsuko
    INFORMATION SECURITY AND CRYPTOLOGY, 2011, 6584 : 62 - 76
  • [44] Predicting and distinguishing attacks on RC4 keystream generator
    Mantin, I
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 491 - 506
  • [45] (Non-)Random Sequences from (Non-)Random Permutations-Analysis of RC4 Stream Cipher
    Sen Gupta, Sourav
    Maitra, Subhamoy
    Paul, Goutam
    Sarkar, Santanu
    JOURNAL OF CRYPTOLOGY, 2014, 27 (01) : 67 - 108
  • [46] Adapting and accelerating the Stream Cipher Algorithm "RC4" using "Ultra Gridsec" and "HIMAN" and use it to secure "HIMAN" Data
    Kholidy, Hisham A.
    Alghathbar, Khaled S.
    JOURNAL OF INFORMATION ASSURANCE AND SECURITY, 2009, 4 (04): : 474 - 483
  • [47] Exploring Security-Performance Trade-offs during Hardware Accelerator Design of Stream Cipher RC4
    Chattopadhyay, Anupam
    Paul, Goutam
    2012 IEEE/IFIP 20TH INTERNATIONAL CONFERENCE ON VLSI AND SYSTEM-ON-CHIP (VLSI-SOC), 2012, : 251 - 254
  • [48] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [49] An Efficient Implementation of RC4 Cipher for Encrypting Multimedia Files on Mobile Devices
    Kim, HongGeun
    Han, JungKyu
    Cho, Seongje
    APPLIED COMPUTING 2007, VOL 1 AND 2, 2007, : 1171 - +
  • [50] A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher
    Paul, S
    Preneel, B
    FAST SOFTWARE ENCRYPTION, 2004, 3017 : 245 - 259