Full Plaintext Recovery Attack on Broadcast RC4

Conference paper

DOI: 10.1007/978-3-662-43933-3_10

Volume 8424 of the book series Lecture Notes in Computer Science (LNCS)
Cite this paper as:
Isobe T., Ohigashi T., Watanabe Y., Morii M. (2014) Full Plaintext Recovery Attack on Broadcast RC4. In: Moriai S. (eds) Fast Software Encryption. FSE 2013. Lecture Notes in Computer Science, vol 8424. Springer, Berlin, Heidelberg

Abstract

This paper investigates the practical security of RC4 in broadcast setting where the same plaintext is encrypted with different user keys. We introduce several new biases in the initial (1st to 257th) bytes of the RC4 keystream, which are substantially stronger than known biases. Combining the new biases with the known ones, a cumulative list of strong biases in the first 257 bytes of the RC4 keystream is constructed. We demonstrate a plaintext recovery attack using our strong bias set of initial bytes by the means of a computer experiment. Almost all of the first 257 bytes of the plaintext can be recovered, with probability more than 0.8, using only \(2^{32}\) ciphertexts encrypted by randomly-chosen keys. We also propose an efficient method to extract later bytes of the plaintext, after the 258th byte. The proposed method exploits our bias set of first 257 bytes in conjunction with the digraph repetition bias proposed by Mantin in EUROCRYPT 2005, and sequentially recovers the later bytes of the plaintext after recovering the first 257 bytes. Once the possible candidates for the first 257 bytes are obtained by our bias set, the later bytes can be recovered from about \(2^{34}\) ciphertexts with probability close to 1.

Keywords

RC4 Broadcast setting Plaintext recovery attack Bias Experimentally-verified attack SSL/TLS Multi-session setting 

Copyright information

© Springer-Verlag Berlin Heidelberg 2014

Authors and Affiliations

  1. 1.Kobe UniversityNada-ku, KobeJapan
  2. 2.Hiroshima UniversityHigashi-Hiroshima, HiroshimaJapan