메뉴 건너뛰기




Volumn 27, Issue 1, 2014, Pages 67-108

(Non-)random sequences from (Non-)random permutations - Analysis of RC4 stream cipher

Author keywords

Bias; Distinguisher; Keylength recovery; Probability distribution; Pseudo random sequences; RC4; Stream ciphers

Indexed keywords


EID: 84894899538     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/s00145-012-9138-1     Document Type: Article
Times cited : (46)

References (37)
  • 1
    • 58549119217 scopus 로고    scopus 로고
    • New results on the key scheduling algorithm of RC4
    • Lecture Notes in Computer Science 5365
    • M. Akgün, P. Kavak, H. Demirci, New results on the key scheduling algorithm of RC4, in INDOCRYPT'08. Lecture Notes in Computer Science, vol. 5365 (2008), pp. 40-52
    • (2008) INDOCRYPT'08 , pp. 40-52
    • Akgün, M.1    Kavak, P.2    Demirci, H.3
  • 2
    • 79953284100 scopus 로고    scopus 로고
    • A complete characterization of the evolution of RC4 pseudo random generation algorithm
    • 10.1515/JMC.2008.012 1146.94006 2573354
    • R. Basu, S. Ganguly, S. Maitra, G. Paul, A complete characterization of the evolution of RC4 pseudo random generation algorithm. J. Math. Cryptol. 2(3), 257-289 (2008)
    • (2008) J. Math. Cryptol. , vol.2 , Issue.3 , pp. 257-289
    • Basu, R.1    Ganguly, S.2    Maitra, S.3    Paul, G.4
  • 3
    • 68849117679 scopus 로고    scopus 로고
    • On some sequences of the secret pseudo-random index j in RC4 key scheduling
    • Lecture Notes in Computer Science 5527
    • R. Basu, S. Maitra, G. Paul, T. Talukdar, On some sequences of the secret pseudo-random index j in RC4 key scheduling, in AAECC'09. Lecture Notes in Computer Science, vol. 5527 (2009), pp. 137-148
    • (2009) AAECC'09 , pp. 137-148
    • Basu, R.1    Maitra, S.2    Paul, G.3    Talukdar, T.4
  • 4
    • 50249183431 scopus 로고    scopus 로고
    • Efficient reconstruction of RC4 keys from internal states
    • Lecture Notes in Computer Science 5086
    • E. Biham, Y. Carmeli, Efficient reconstruction of RC4 keys from internal states, in FSE'08. Lecture Notes in Computer Science, vol. 5086 (2008), pp. 270-288
    • (2008) FSE'08 , pp. 270-288
    • Biham, E.1    Carmeli, Y.2
  • 5
    • 80054795219 scopus 로고    scopus 로고
    • How to find short RC4 colliding key pairs
    • Lecture Notes in Computer Science 7001
    • J. Chen, A. Miyaji, How to find short RC4 colliding key pairs, in ISC'11. Lecture Notes in Computer Science, vol. 7001 (2011), pp. 32-46
    • (2011) ISC'11 , pp. 32-46
    • Chen, J.1    Miyaji, A.2
  • 6
    • 84974666258 scopus 로고    scopus 로고
    • Statistical analysis of the alleged RC4 keystream generator
    • Lecture Notes in Computer Science 1978
    • S.R. Fluhrer, D.A. McGrew, Statistical analysis of the alleged RC4 keystream generator, in FSE'00. Lecture Notes in Computer Science, vol. 1978 (2000), pp. 19-30
    • (2000) FSE'00 , pp. 19-30
    • Fluhrer, S.R.1    McGrew, D.A.2
  • 7
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • Lecture Notes in Computer Science 2259
    • S.R. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the key scheduling algorithm of RC4, in SAC'01. Lecture Notes in Computer Science, vol. 2259 (2001), pp. 1-24
    • (2001) SAC'01 , pp. 1-24
    • Fluhrer, S.R.1    Mantin, I.2    Shamir, A.3
  • 8
    • 84957380512 scopus 로고    scopus 로고
    • Linear statistical weakness of alleged RC4 keystream generator
    • Lecture Notes in Computer Science 1233
    • J.D. Golic, Linear statistical weakness of alleged RC4 keystream generator, in EUROCRYPT'97. Lecture Notes in Computer Science, vol. 1233 (1997), pp. 226-238
    • (1997) EUROCRYPT'97 , pp. 226-238
    • Golic, J.D.1
  • 9
    • 84958985862 scopus 로고    scopus 로고
    • Iterative probabilistic cryptanalysis of RC4 keystream generator
    • Lecture Notes in Computer Science 1841
    • J.D. Golic, Iterative probabilistic cryptanalysis of RC4 keystream generator, in ACISP'00. Lecture Notes in Computer Science, vol. 1841 (2000), pp. 220-233
    • (2000) ACISP'00 , pp. 220-233
    • Golic, J.D.1
  • 12
    • 38349034222 scopus 로고    scopus 로고
    • Published on the Internet
    • R.J. Jenkins, ISAAC and RC4 (1996). Published on the Internet at http://burtleburtle.net/bob/rand/isaac.html
    • (1996) ISAAC and RC4
    • Jenkins, R.J.1
  • 13
    • 58849146687 scopus 로고    scopus 로고
    • On reconstruction of RC4 keys from internal states
    • Lecture Notes in Computer Science 5393
    • S. Khazaei, W. Meier, On reconstruction of RC4 keys from internal states, in MMICS'08. Lecture Notes in Computer Science, vol. 5393 (2008), pp. 179-189
    • (2008) MMICS'08 , pp. 179-189
    • Khazaei, S.1    Meier, W.2
  • 14
    • 47749085463 scopus 로고    scopus 로고
    • Attacks on the RC4 stream cipher
    • 10.1007/s10623-008-9206-6 1179.94064 2411115
    • A. Klein, Attacks on the RC4 stream cipher. Des. Codes Cryptogr. 48(3), 269-286 (2008)
    • (2008) Des. Codes Cryptogr. , vol.48 , Issue.3 , pp. 269-286
    • Klein, A.1
  • 15
    • 84944076741 scopus 로고    scopus 로고
    • Analysis methods for (alleged) RC4
    • Lecture Notes in Computer Science 1514
    • L.R. Knudsen, W. Meier, B. Preneel, V. Rijmen, S. Verdoolaege, Analysis methods for (alleged) RC4, in ASIACRYPT'98. Lecture Notes in Computer Science, vol. 1514 (1998), pp. 327-341
    • (1998) ASIACRYPT'98 , pp. 327-341
    • Knudsen, L.R.1    Meier, W.2    Preneel, B.3    Rijmen, V.4    Verdoolaege, S.5
  • 16
    • 79959986641 scopus 로고    scopus 로고
    • Attack on broadcast RC4 revisited
    • Lecture Notes in Computer Science 6733
    • S. Maitra, G. Paul, S. Sen Gupta, Attack on broadcast RC4 revisited, in FSE'11. Lecture Notes in Computer Science, vol. 6733 (2011), pp. 199-217
    • (2011) FSE'11 , pp. 199-217
    • Maitra, S.1    Paul, G.2    Sen Gupta, S.3
  • 17
    • 2942557845 scopus 로고    scopus 로고
    • Master's Thesis, The Weizmann Institute of Science, Israel
    • I. Mantin, Analysis of the stream cipher RC4. Master's Thesis, The Weizmann Institute of Science, Israel (2001). Available at http://www.wisdom. weizmann.ac.il/~itsik/RC4/rc4.html
    • (2001) Analysis of the Stream Cipher RC4
    • Mantin, I.1
  • 18
    • 84958972140 scopus 로고    scopus 로고
    • A practical attack on broadcast RC4
    • Lecture Notes in Computer Science 2355
    • I. Mantin, A. Shamir, A practical attack on broadcast RC4, in FSE'01. Lecture Notes in Computer Science, vol. 2355 (2002), pp. 152-164
    • (2002) FSE'01 , pp. 152-164
    • Mantin, I.1    Shamir, A.2
  • 19
    • 24944554565 scopus 로고    scopus 로고
    • Predicting and distinguishing attacks on RC4 keystream generator
    • Lecture Notes in Computer Science 3494
    • I. Mantin, Predicting and distinguishing attacks on RC4 keystream generator, in EUROCRYPT'05. Lecture Notes in Computer Science, vol. 3494 (2005), pp. 491-506
    • (2005) EUROCRYPT'05 , pp. 491-506
    • Mantin, I.1
  • 20
    • 33646812220 scopus 로고    scopus 로고
    • A practical attack on the fixed RC4 in the WEP mode
    • Lecture Notes in Computer Science 3788
    • I. Mantin, A practical attack on the fixed RC4 in the WEP mode, in ASIACRYPT'05. Lecture Notes in Computer Science, vol. 3788 (2005), pp. 395-411
    • (2005) ASIACRYPT'05 , pp. 395-411
    • Mantin, I.1
  • 21
    • 70350367211 scopus 로고    scopus 로고
    • Key collisions of the RC4 stream cipher
    • Lecture Notes in Computer Science 5665
    • M. Matsui, Key collisions of the RC4 stream cipher, in FSE'09. Lecture Notes in Computer Science, vol. 5665 (2009), pp. 38-50
    • (2009) FSE'09 , pp. 38-50
    • Matsui, M.1
  • 22
    • 51849130337 scopus 로고    scopus 로고
    • New state recovery attack on RC4
    • Lecture Notes in Computer Science 5157
    • A. Maximov, D. Khovratovich, New state recovery attack on RC4, in CRYPTO'08. Lecture Notes in Computer Science, vol. 5157 (2008), pp. 297-316
    • (2008) CRYPTO'08 , pp. 297-316
    • Maximov, A.1    Khovratovich, D.2
  • 23
    • 84937401544 scopus 로고    scopus 로고
    • (Not so) random shuffles of RC4
    • Lecture Notes in Computer Science 2442
    • I. Mironov, (Not so) random shuffles of RC4, in CRYPTO'02. Lecture Notes in Computer Science, vol. 2442 (2002), pp. 304-319
    • (2002) CRYPTO'02 , pp. 304-319
    • Mironov, I.1
  • 24
    • 84859054985 scopus 로고    scopus 로고
    • Cryptanalysis of RC4-like ciphers
    • Lecture Notes in Computer Science 1999
    • S. Mister, S.E. Tavares, Cryptanalysis of RC4-like ciphers, in SAC'98. Lecture Notes in Computer Science, vol. 1999 (1998), pp. 131-143
    • (1998) SAC'98 , pp. 131-143
    • Mister, S.1    Tavares, S.E.2
  • 25
    • 0347526103 scopus 로고    scopus 로고
    • Analysis of non-fortuitous predictive states of the RC4 keystream generator
    • Lecture Notes in Computer Science 2904
    • S. Paul, B. Preneel, Analysis of non-fortuitous predictive states of the RC4 keystream generator, in INDOCRYPT'03. Lecture Notes in Computer Science, vol. 2904 (2003), pp. 52-67
    • (2003) INDOCRYPT'03 , pp. 52-67
    • Paul, S.1    Preneel, B.2
  • 26
    • 38549126576 scopus 로고    scopus 로고
    • Permutation after RC4 key scheduling reveals the secret key
    • Lecture Notes in Computer Science 4876
    • G. Paul, S. Maitra, Permutation after RC4 key scheduling reveals the secret key, in SAC'07. Lecture Notes in Computer Science, vol. 4876 (2007), pp. 360-377
    • (2007) SAC'07 , pp. 360-377
    • Paul, G.1    Maitra, S.2
  • 27
    • 0038331163 scopus 로고
    • Two posts in sci.crypt, message-id 43u1eh1j3@hermes.is.co.za and 44ebgellf@hermes.is.co.za
    • A. Roos, A class of weak keys in the RC4 stream cipher. Two posts in sci.crypt, message-id 43u1eh1j3@hermes.is.co.za and 44ebgellf@hermes.is.co.za (1995). Available at http://www.impic.org/papers/WeakKeys-report.pdf
    • (1995) A Class of Weak Keys in the RC4 Stream Cipher
    • Roos, A.1
  • 28
    • 84863274546 scopus 로고    scopus 로고
    • Proof of empirical RC4 biases and new key correlations
    • Lecture Notes in Computer Science 7118
    • S. Sen Gupta, S. Maitra, G. Paul, S. Sarkar, Proof of empirical RC4 biases and new key correlations, in SAC'11. Lecture Notes in Computer Science, vol. 7118 (2011), pp. 151-168
    • (2011) SAC'11 , pp. 151-168
    • Sen Gupta, S.1    Maitra, S.2    Paul, G.3    Sarkar, S.4
  • 30
    • 79952593099 scopus 로고    scopus 로고
    • Discovery and exploitation of new biases in RC4
    • Lecture Notes in Computer Science 6544
    • P. Sepehrdad, S. Vaudenay, M. Vuagnoux, Discovery and exploitation of new biases in RC4, in SAC'10. Lecture Notes in Computer Science, vol. 6544 (2011), pp. 74-91
    • (2011) SAC'10 , pp. 74-91
    • Sepehrdad, P.1    Vaudenay, S.2    Vuagnoux, M.3
  • 31
    • 79957980242 scopus 로고    scopus 로고
    • Statistical attack on RC4 - Distinguishing WPA
    • Lecture Notes in Computer Science 6632
    • P. Sepehrdad, S. Vaudenay, M. Vuagnoux, Statistical attack on RC4 - distinguishing WPA, in EUROCRYPT'11. Lecture Notes in Computer Science, vol. 6632 (2011), pp. 343-363
    • (2011) EUROCRYPT'11 , pp. 343-363
    • Sepehrdad, P.1    Vaudenay, S.2    Vuagnoux, M.3
  • 32
    • 2642513982 scopus 로고    scopus 로고
    • An improved internal-state reconstruction method of a stream cipher RC4
    • Track 440-088, New York, USA December 10-12
    • Y. Shiraishi, T. Ohigashi, M. Morii, An improved internal-state reconstruction method of a stream cipher RC4, in Communication, Network, and Information Security. Track 440-088, New York, USA, December 10-12 (2003)
    • (2003) Communication, Network, and Information Security
    • Shiraishi, Y.1    Ohigashi, T.2    Morii, M.3
  • 33
    • 33846288293 scopus 로고    scopus 로고
    • Finding an internal state of RC4 stream cipher
    • 10.1016/j.ins.2006.10.010 1116.68419 2303182
    • V. Tomasevic, S. Bojanic, O. Nieto-Taladriz, Finding an internal state of RC4 stream cipher. Inf. Sci. 177, 1715-1727 (2007)
    • (2007) Inf. Sci. , vol.177 , pp. 1715-1727
    • Tomasevic, V.1    Bojanic, S.2    Nieto-Taladriz, O.3
  • 34
    • 38549101578 scopus 로고    scopus 로고
    • Breaking 104 bit WEP in less than 60 seconds
    • Lecture Notes in Computer Science 4867
    • E. Tews, R.-P. Weinmann, A. Pyshkin, Breaking 104 bit WEP in less than 60 seconds, in WISA'07. Lecture Notes in Computer Science, vol. 4867 (2007), pp. 188-202
    • (2007) WISA'07 , pp. 188-202
    • Tews, E.1    Weinmann, R.-P.2    Pyshkin, A.3
  • 35
    • 70349147400 scopus 로고    scopus 로고
    • Practical attacks against WEP and WPA
    • ACM New York
    • E. Tews, M. Beck, Practical attacks against WEP and WPA, in WISEC'09 (ACM, New York, 2009), pp. 79-86
    • (2009) WISEC'09 , pp. 79-86
    • Tews, E.1    Beck, M.2
  • 36
    • 38549167348 scopus 로고    scopus 로고
    • Passive-only key recovery attacks on RC4
    • Lecture Notes in Computer Science 4876
    • S. Vaudenay, M. Vuagnoux, Passive-only key recovery attacks on RC4, in SAC'07. Lecture Notes in Computer Science, vol. 4876 (2007), pp. 344-359
    • (2007) SAC'07 , pp. 344-359
    • Vaudenay, S.1    Vuagnoux, M.2
  • 37


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.