Fast and Efficient Key Recovery from RC4 Permutation after KSA

نویسنده

  • Goutam Paul
چکیده

The RC4 stream cipher has been designed by Ron Rivest for RSA Data Security in 1987, and was a propriety algorithm until 1994. Currently, RC4 is extremely popular in commercial domain and widely used in network protocols such as Secure Sockets Layer (SSL), Transport Layer Security (TLS), Wired Equivalent Privacy (WEP), Wi-Fi Protected Access (WPA) etc. RC4 uses an S-Box S = (S[0], . . . , S[N − 1]) of N bytes, initialized as the identity permutation. Typically, N = 256. A secret key k of size l bytes (typically, 5 ≤ l ≤ 16) is used to scramble this permutation. An array K = (K[0], . . . , K[N − 1]) is used to hold the secret key, the key is repeated in the array K at key length boundaries. where K[y] = k[y mod l] for any y, 0 ≤ y ≤ N − 1, i.e., The RC4 cipher has two components, namely, the Key Scheduling Algorithm (KSA) and the Pseudo-Random Generation Algorithm (PRGA). The KSA turns the random key K into a random looking permutation S of 0, 1, . . . , N − 1 and the PRGA uses this permutation to generate the pseudo-random keystream bytes z. Both the KSA and the PRGA uses a deterministic index i and a secret pseudo-random index j to scramble the permutation by transposition. Any addition used related to the RC4 description is in general addition modulo N unless specified otherwise.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

On Non-randomness of the Permutation After RC4 Key Scheduling

Here we study a weakness of the RC4 Key Scheduling Algorithm (KSA) that has already been noted by Mantin and Mironov. Consider the RC4 permutation S of N (usually 256) bytes and denote it by SN after the KSA. Under reasonable assumptions we present a simple proof that each permutation byte after the KSA is significantly biased (either positive or negative) towards many values in the range 0, . ...

متن کامل

RC 4 State Information at Any Stage Reveals the

A theoretical analysis of the RC4 Key Scheduling Algorithm (KSA) is presented in this paper, where the nonlinear operation is swapping among the permutation bytes. Explicit formulae are provided for the probabilities with which the permutation bytes at any stage of the KSA are biased to the secret key. Theoretical proofs of these formulae have been left open since Roos’s work (1995). Based on t...

متن کامل

New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, the initial bytes of the permutation, i.e., S[y] for small values of y are biased towards some linear combination of secret key bytes. In this paper, for the first time we show that the bias can be observed in S[S[y]] too. Based on this new form of permuatation bias after the KSA an...

متن کامل

Novel Hardware Implementation of Modified RC4 Stream Cipher for Wireless Network Security

This paper presents novel hardware implementation of modified RC4 stream cipher for wireless network security. The Modified RC4 algorithm proposes two changes in conventional RC4 stream cipher algorithm, one in Key Scheduling Algorithm (KSA) stage and other in Pseudorandom Generation Algorithm (PRGA) stage. This modification in KSA removed many weakness and produces random states, so that it wi...

متن کامل

Analysis of RC4 and Proposal of Additional Layers for Better Security Margin

In this paper, the RC4 Key Scheduling Algorithm (KSA) is theoretically studied to reveal non-uniformity in the expected number of times each value of the permutation is touched by the indices i, j. Based on our analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2009