2008
DOI: 10.1007/978-3-540-89994-5_14
|View full text |Cite
|
Sign up to set email alerts
|

On Reconstruction of RC4 Keys from Internal States

Abstract: Abstract. In this work key recovery algorithms from the known internal states of RC4 are investigated. In particular, we propose a bit-by-bit approach to recover the key by starting from LSB's of the key bytes and ending with their MSB's.

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
4
0

Year Published

2009
2009
2015
2015

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 7 publications
(26 reference statements)
0
4
0
Order By: Relevance
“…In the similar direction, a bit-by-bit key recovery approach is discussed in [7]. We have also added to our initial work of [20] in Sections 2.5, 3.4 of the current paper.…”
Section: Outline Of the Contributionmentioning
confidence: 92%
“…In the similar direction, a bit-by-bit key recovery approach is discussed in [7]. We have also added to our initial work of [20] in Sections 2.5, 3.4 of the current paper.…”
Section: Outline Of the Contributionmentioning
confidence: 92%
“…Later, Matsui [22] reported colliding key pairs for RC4 for the first time and then stronger key collisions were found by Chen and Miyaji [5]. A direct approach for key recovery from the internal permutation of RC4 was first proposed by Paul and Maitra [28], and was later studied by Biham and Carmeli [4], Khazaei and Meier [13], Akgün, Kavak and Demirci [1], and Basu, Maitra, Paul and Talukdar [3].…”
Section: An Overview Of Rc4 Cryptanalysismentioning
confidence: 98%
“…The technique discussed by authors in [20] is known to be the more efficient and faster approach form key recovery from state. Another key recovery approach was discussed in [21] which is again an improvement over the technique given by [19]. Authors have used the same differential equation as in [19], but key was recovered using bit by bit approach.…”
Section: Key Recovery From Statementioning
confidence: 99%
“…It is revealed that the proposed proposed RC4 has two internal states and has removed some of the byte biases which are the foundation of many security attacks on RC4 and is also faster than the existing conventional RC4. -short related keys attack [14] -TWP WEP attack [28] -VV WEP attack [29] Hill climb search attack [39] 2008 -Difference equations [19] -bit by bit approach attack [21] --generative pattern [40] -iterative probabilistic attack [41] Maitra and Paul conditional Bias [56] In [64] authors have proposed a new variant of RC4 called Quad-RC4 without changing the basic structure of conventional RC4. The proposed RC4 structure promises the reasonable security and a high throughput.…”
Section: Enhancements In Rc4 Stream Ciphermentioning
confidence: 99%