Cryptography and Communications

, Volume 7, Issue 3, pp 317–330 | Cite as

Further non-randomness in RC4, RC4A and VMPC

Article

Abstract

RC4 is one of the most popular stream ciphers that generates pseudorandom words from pseudorandom permutations. In this paper we identify new bias for RC4 and its variants RC4A and VMPC, which are designed in a similar paradigm. Naturally, these biases provide new distinguishers for the pseudo-random keystream generated from these algorithms. In particular, our result provides the strongest distinguisher against VMPC. Although RC4A is of less practical interest, a lot of protocols use VMPC.

Keywords

Bias Cryptanalysis Distinguisher RC4 RC4A Stream Ciphers VMPC 

Mathematics Subject Classification (2010)

94A60 

References

  1. 1.
    AlFardan, N., Bernstein, D., Paterson, K., Poettering, B., Schuldt, J. On the security of RC4 in TLS. Published online at http://www.isg.rhul.ac.uk/tls/
  2. 2.
    Biham, E., Seberry. Py (Roo), J.: A Fast and Secure Stream Cipher using Rolling Arrays eSTREAM, ECRYPT Stream Cipher Project, Report 2005/023 (2005)Google Scholar
  3. 3.
    Biham, E., Seberry, J. : C Code of Py6. eSTREAM, ECRYPT Stream Cipher Project (2005). http://www.ecrypt.eu.org/stream/py.html
  4. 4.
    Fluhrer, S.R., McGrew, D.A.: Statistical Analysis of the Alleged RC4 Keystream Generator In: Proceedings of FSE 2000, LNCS, vol. 1978, pp 19–30. Springer (2000)Google Scholar
  5. 5.
    Gong, G., Gupta, K.C., Hell, M., Nawaz, Y.: Towards a General RC4-Like Keystream Generator In: Proceedings of CISC 2005, LNCS, vol. 3822, pp 162–174. Springer (2005)Google Scholar
  6. 6.
    Isobe, T., Ohigashi, T., Watanabe, Y., Morii, M.: Full plaintext recovery attack on broadcast RC4. To appear in proceedings of FSE (2013)Google Scholar
  7. 7.
    Jenkins, R. J. Jr.: ISAAC. In: Proceedings of FSE 1996, LNCS, vol. 1039, pp 41–49. Springer (1996)Google Scholar
  8. 8.
    Keller, N., Miller, S., Mironov, I., Venkatesan, R.: MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers In: Proceedings of CT-RSA 2007, LNCS, vol. 4377, pp 1–19 (2007)Google Scholar
  9. 9.
    Maitra, S., Paul, G., Sen Gupta, S.: Attack on broadcast RC4 Revisited In: Proceedings of FSE 2011, LNCS, vol. 6733, pp 199–217. Springer (2011)Google Scholar
  10. 10.
    Mantin, I.: Analysis of the stream cipher RC4. Master’s thesis. The Weizmann Institute of Science, Israel (2001)Google Scholar
  11. 11.
    Mantin, I. : Predicting and Distinguishing Attacks on RC4 Keystream Generator In: Proceedings of Eurocrypt 2005, LNCS, vol. 3494, pp 491–506. Springer (2005)Google Scholar
  12. 12.
    Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4 In: Proceedings of FSE 2001, LNCS, vol. 2355, pp 152–164. Springer (2001)Google Scholar
  13. 13.
    Maximov, A.: Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of the RC4 Family of Stream Ciphers In: Proceedings of FSE 2005, LNCS, vol. 3557, pp 342–358. Springer (2005)Google Scholar
  14. 14.
    Mironov, I.: (Not So) Random Shuffles of RC4 In: Proceedings of Crypto 2002, LNCS, vol. 2442, pp 304–319. Springer (2002)Google Scholar
  15. 15.
    Ohigashi, T., Isobe, T., Watanabe, Y., Morii, M.: How to Recover Any Byte of Plaintext on RC4. Accepted in SAC (2013)Google Scholar
  16. 16.
    Nawaz, Y., Gupta, K.C., Gong, G.: A 32-bit RC4-like Keystream Generator. Cryptology ePrint. Archive:2005/175
  17. 17.
    Paterson, K., Schuldt, J., Poettering, B.: Plaintext Recovery Attacks Against WPA/TKIP. Accepted in FSE (2014)Google Scholar
  18. 18.
    Paul, S., Preneel, B.: A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher In: Proceedings of FSE 2004, LNCS, vol. 3017, pp 245–259. Springer (2004)Google Scholar
  19. 19.
    Paul, S., Preneel, B., Sekar, G.: Distinguishing Attacks on the Stream Cipher Py In: Proceedings of FSE 2006, LNCS, vol. 4047, pp 405–421. Springer (2006)Google Scholar
  20. 20.
    Paul, S., Preneel, B.: On the (In)security of Stream Ciphers Based on Arrays and Modular Addition In: Proceedings of Asiacrypt 2006, LNCS, vol. 4284, pp 69–73. Springer (2006)Google Scholar
  21. 21.
    Sepehrdad, P.: Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives. Ph.D. thesis, École Polytechnique Fédérale de Lausanne (EPFL), 2012. http://lasecwww.epfl.ch/~sepehrdad/Pouyan_Sepehrdad_PhD_Thesis.pdf
  22. 22.
    Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Discovery and Exploitation of New Biases in RC4 In: Proceedings of SAC 2010, LNCS, vol. 6544, pp 74–91. Springer (2010)Google Scholar
  23. 23.
    Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Statistical Attack on RC4 – Distinguishing WPA In: Proceedings of EUROCRYPT 2011, LNCS, vol. 6632, pp 343–363. Springer (2011)Google Scholar
  24. 24.
    Tsunoo, Y., Saito, T., Kubo, H., Shigeri, M., Suzaki, T., Kawabata, T.: The Most Efficient Distinguishing Attack on VMPC and RC4A. In: Proceedings of SKEW (2005)Google Scholar
  25. 25.
    Zoltak, B.: VMPC One-Way Function and Stream Cipher In: Proceedings of FSE 2004, LNCS, vol. 3017, pp 210–225. Springer (2004)Google Scholar
  26. 26.
    Zoltak, B.: Personal communicationGoogle Scholar

Copyright information

© Springer Science+Business Media New York 2014

Authors and Affiliations

  1. 1.Chennai Mathematical InstituteChennaiIndia

Personalised recommendations