Abstract
In this work key recovery algorithms from the known internal states of RC4 are investigated. In particular, we propose a bit-by-bit approach to recover the key by starting from LSB’s of the key bytes and ending with their MSB’s.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Akgün, M., Kavak, P., Demirci, H.: New Results on the Key Scheduling Algorithm of RC4. Indocrypt (to appear, 2008)
Biham, E., Carmeli, Y.: Efficient reconstruction of RC4 keys from internal states. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol. 5086, pp. 270–288. Springer, Heidelberg (2008)
Cover, T., Thomas, J.A.: Elements of Information Theory. Wiley series in Telecommunication. Wiley, Chichester (1991)
Maximov, A., Khovratovich, D.: New state recovery attack on RC4. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol. 5157, pp. 297–316. Springer, Heidelberg (2008), http://eprint.iacr.org/2008/017
Paul, G., Maitra, S.: Permutation after RC4 key scheduling reveals the secret key. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 360–377. Springer, Heidelberg (2007), http://eprint.iacr.org/2007/208.pdf
Roos, A.: A Class of Weak Keys in the RC4 Stream Cipher. In: Two posts in sci.crypt. (1995), http://marcel.wanda.ch/Archive/WeakKeys
Siegenthaler, T.: Decrypting a class of stream ciphers using ciphertext only. IEEE Transactions on Computers C-34, 81–85 (1985)
Vaudenay, S., Vuagnoux, M.: Passive–only key recovery attacks on RC4. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol. 4876, pp. 344–359. Springer, Heidelberg (2007)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this chapter
Cite this chapter
Khazaei, S., Meier, W. (2008). On Reconstruction of RC4 Keys from Internal States. In: Calmet, J., Geiselmann, W., Müller-Quade, J. (eds) Mathematical Methods in Computer Science. Lecture Notes in Computer Science, vol 5393. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-89994-5_14
Download citation
DOI: https://doi.org/10.1007/978-3-540-89994-5_14
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-89993-8
Online ISBN: 978-3-540-89994-5
eBook Packages: Computer ScienceComputer Science (R0)