New form of permutation bias and secret key leakage in keystream bytes of RC4

27Citations
Citations of this article
43Readers
Mendeley users who have this article in their library.

Abstract

Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for small values of y, is biased towards some linear combination of the secret key bytes. In this paper, for the first time we show that the bias can be observed in S[S[y]] too. Based on this new form of permutation bias after the KSA and other related results, a complete framework is presented to show that many keystream output bytes of RC4 are significantly biased towards several linear combinations of the secret key bytes. The results do not assume any condition on the secret key. We find new biases in the initial as well as in the 256-th and 257-th keystream output bytes. For the first time biases at such later stages are discovered without any knowledge of the secret key bytes. We also identify that these biases propagate further, once the information for the index j is revealed. © 2008 Springer-Verlag Berlin Heidelberg.

References Powered by Scopus

Weaknesses in the key scheduling algorithm of RC4

514Citations
N/AReaders
Get full text

A practical attack on broadcast RC4

187Citations
N/AReaders
Get full text

A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher

122Citations
N/AReaders
Get full text

Cited by Powered by Scopus

Analysis of RC4 and proposal of additional layers for better security margin

57Citations
N/AReaders
Get full text

Discovery and exploitation of new biases in RC4

43Citations
N/AReaders
Get full text

Statistical attack on RC4: Distinguishing WPA

31Citations
N/AReaders
Get full text

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Cite

CITATION STYLE

APA

Maitra, S., & Paul, G. (2008). New form of permutation bias and secret key leakage in keystream bytes of RC4. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 5086 LNCS, pp. 253–269). https://doi.org/10.1007/978-3-540-71039-4_16

Readers' Seniority

Tooltip

PhD / Post grad / Masters / Doc 27

75%

Professor / Associate Prof. 3

8%

Lecturer / Post doc 3

8%

Researcher 3

8%

Readers' Discipline

Tooltip

Computer Science 30

79%

Engineering 3

8%

Mathematics 3

8%

Physics and Astronomy 2

5%

Save time finding and organizing research with Mendeley

Sign up for free