Attacks on the RC4 stream cipher

被引:122
作者
Klein, Andreas [1 ]
机构
[1] Univ Ghent, Dept Pure Math & Comp Algebra, B-9000 Ghent, Belgium
关键词
cryptanalysis; stream cipher; RC4;
D O I
10.1007/s10623-008-9206-6
中图分类号
TP301 [理论、方法];
学科分类号
081202 [计算机软件与理论];
摘要
In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described by Fluhrer, Mantin, Shamir (In: Selected Areas in Cryptography, 2001) in such a way, that it will work, if the weak keys described in that paper are avoided. A further attack will work even if the first 256 Byte of the output remain unused. Finally we show that variants of the RC4 algorithm like NGG and RC4A are also vulnerable by these techniques.
引用
收藏
页码:269 / 286
页数:18
相关论文
共 13 条
[1]
[Anonymous], 2001, LNCS
[2]
Ferguson N., 2003, Practical Cryptography
[3]
FLUHRER S, 2000, LNCS, V1978, P19
[4]
Fluhrer S., 2001, International Workshop on Selected Areas in Cryptography, P1
[5]
GOLIC J, 1997, LNCS, V1233, P226
[6]
Linear models for a time-variant permutation generator [J].
Golic, JD .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1999, 45 (07) :2374-2382
[7]
GOLIC JD, 2000, ACISP, P220
[8]
GUPTA K, 2005, 200521 CACR U WAT
[9]
MANTIN I, 2000, LNCS, V3494, P491
[10]
Mironov I, 2002, LECT NOTES COMPUT SC, V2442, P304