Reducing the State Space of RC4 Stream Cipher
نویسندگان
چکیده
The paper introduces an abstraction in form of general conditions for cryptanalytic managing of the information about the current state of the RC4 stream cipher. The general conditions based strategy is used to favor more promising values that should be assigned to unknown entries in the RC4 table. The estimated complexity of the cryptanalytic attack is lower than the best published result although the RC4 remains a quite secure cipher in practice.
منابع مشابه
The Stream Cipher Polar Bear
We propose a new stream cipher called “Polar Bear”. It combines constructions used successfully in other situations. The key initialization uses Rijndael, the steady state uses a dynamic table as in RC4 and we guarantee a long period through the use of a linear feedback shiftregister. The efficiency for short messages is better than that of RC4 while for long messages Polar Bear is about a fact...
متن کاملRC4 stream cipher and possible attacks on WEP
In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a var...
متن کاملAn Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks
To date, most applications of algebraic analysis and attacks on stream ciphers are on those based on linear feedback shift registers (LFSRs). In this paper, we extend algebraic analysis to non-LFSR based stream ciphers. Specifically, we perform an algebraic analysis on the RC4 family of stream ciphers, an example of stream ciphers based on dynamic tables, and investigate its implications to pot...
متن کاملGeneralized Classes of Weak Keys on RC4 Using Predictive State
Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using generalized relational equations and special classes of the internal state (called predictive state). We derive the probability that generalized classes of w...
متن کاملQuad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher
RC4 has remained the most popular software stream cipher since the last two decades. In parallel to cryptanalytic attempts, researchers have come up with many variants of RC4, some targeted to more security, some towards more throughput. We observe that the design of RC4 has been changed a lot in most of the variants. Since the RC4 structure is quite secure if the cipher is used with proper pre...
متن کامل