2011
DOI: 10.1007/978-3-642-19574-7_5
|View full text |Cite
|
Sign up to set email alerts
|

Discovery and Exploitation of New Biases in RC4

Abstract: Abstract. In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known KSA weaknesses to provide practical key recovery attacks. Henceforth, we apply a similar technique on RC4 as a black box, i.e. the secret key words as input and the keystream words as output. Our objective is to exh… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

5
59
0

Year Published

2011
2011
2020
2020

Publication Types

Select...
6
1

Relationship

2
5

Authors

Journals

citations
Cited by 47 publications
(64 citation statements)
references
References 21 publications
5
59
0
Order By: Relevance
“…Obviously, we can easily justify that Approximations (5), (6) are independent, because the involved states x 10100 , x 00100 in (5) are independent of the involved states x 10110 , x 00110 in (6); similarly, Approximations (8), (9), (10), (11) are independent pairwise. Our main focus here is to show below that these two groups of approximations are, however, not independent.…”
Section: Preliminary Analysis On Cubehash Round Functionmentioning
confidence: 96%
See 3 more Smart Citations
“…Obviously, we can easily justify that Approximations (5), (6) are independent, because the involved states x 10100 , x 00100 in (5) are independent of the involved states x 10110 , x 00110 in (6); similarly, Approximations (8), (9), (10), (11) are independent pairwise. Our main focus here is to show below that these two groups of approximations are, however, not independent.…”
Section: Preliminary Analysis On Cubehash Round Functionmentioning
confidence: 96%
“…The internal states are invertible with the CubeHash round function T , as each step operation is invertible. Thus, we can rewrite Approximations (8), (9), (10), (11) in terms of states right after step one as follows respectively,…”
Section: Preliminary Analysis On Cubehash Round Functionmentioning
confidence: 99%
See 2 more Smart Citations
“…As reported in the literature the adversary attack the WEP protocol by recovering the secret key K from the known values of IV (initialization vector) and known values of the RC4 keystream bytes found from the plaintext and ciphertext pairs. [31][32][33], and Shepehrdad, Susil, Vaudenay and Vuagnoux (SSVV) attack [34], WEP was declared as an insecure protocol. Later it is replaced by WPA (Wi-Fi protected access) which also make use of RC4 as its core element.…”
Section: Key Recovery From Keystreammentioning
confidence: 99%