Stream Ciphers pp 183-228 | Cite as

RC4 and Related Ciphers

  • Andreas Klein

Abstract

RC4 is a widely used cipher designed for 8-bit processors. It is part of the wireless LAN standards WEP and WPA. The chapter starts with the analysis of these protocols and show how protocol failures helps the attacker. Then we analyse RC4 in detail with a special focus on the weak key scheduling. We will learn how to break RC4 if carelessly used and we will learn how to use it in a secure way. We will also have a look on some variations of RC4 and see how to transfer attacks against RC4 to its variants.

References

  1. 4.
    Aircrack-ng a toolsuite. http://www.aircrack-ng.org
  2. 7.
    Arbaugh, W.A.: An inductive chosen plaintext attack against WEP/WEP2 (2001). http://www.cs.umd.edu/~waa/attack/v3dcmnt.htm
  3. 79.
    Diaconis, A.: In: Group Representations in Probability and Statistics. Lecture Notes-Monographs Series, vol. 11. IMS, Hayward (1988) Google Scholar
  4. 93.
    Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas in Cryptography. LNCS, vol. 2259, pp. 1–24. Springer, Berlin (2001) CrossRefGoogle Scholar
  5. 95.
    Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Proceedings of the 7th International Workshop on Fast Software Encryption. LNCS, vol. 1978, pp. 19–20. Springer, Berlin (2000) CrossRefGoogle Scholar
  6. 108.
    Goldstein, D., Moews, D.: The identity is the most likely exchange shuffle for large n. Aequ. Math. 65(1–2), 3–30 (2003) MathSciNetMATHGoogle Scholar
  7. 110.
    Golić, J.Dj.: Linear statistical weakness of alleged RC4 keystream generator. In: Advances in Cryptology—EUROCRYPTO ’97. LNCS, vol. 1233, pp. 226–238. Springer, Berlin (1997) Google Scholar
  8. 111.
    Golić, J.Dj.: Linear models for a time-variant-permutation generator. IEEE Trans. Inf. Theory 45(7), 2374–2382 (1999) MATHCrossRefGoogle Scholar
  9. 112.
    Golić, J.Dj.: Iterative probabilistic cryptanalysis of RC4 keystream generator. In: ACISP 2000, pp. 220–233 (2000) Google Scholar
  10. 116.
    Gong, G., Gupta, K.C., Hell, M., Nawaz, Y.: Towards a general RC4-like keystream generator. In: Information Security and Cryptology. Lecture Notes in Comput. Sci., vol. 3822, pp. 162–174. Springer, Berlin (2005) CrossRefGoogle Scholar
  11. 121.
    Gupta, K., Gong, G., Nawaz, Y.: A 32-bit RC4-like keystream generator. Technical Report CACR 2005-21, Center for Applied Cryptographic Research, University of Waterloo, 2005. http://www.cacr.math.uwaterloo.ca/tech_reports.html
  12. 133.
    Hulton, D.: Practical exploration of RC4 weaknesses in WEP environments. Presented at HiverCon (2002) Google Scholar
  13. 148.
    Klein, A.: Attacks against the RC4 stream cipher. Des. Codes Cryptogr. 48, 269–286 (2008) MathSciNetMATHCrossRefGoogle Scholar
  14. 149.
    Knudsen, L.R., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis methods for (alleged) RC4. In: Ohta, K., Pei, D. (eds.) Advances in Cryptology—ASIACRYPT’98. Lecture Notes in Computer Science, vol. 1998, pp. 327–341. Springer, Berlin (1998) Google Scholar
  15. 152.
    Knuth, D.E.: The Art of Computer Programming, vol. 2. Seminumerical Algorithms, 3rd edn. Addison-Wesley, Reading (1998) MATHGoogle Scholar
  16. 164.
    KoreK: chopchop (experimental WEP attacks) (2004). http://www.netstumbler.org/showthread.php?t=12489
  17. 165.
    KoreK: Next generation of WEP attacks? (2004). http://www.netstumbler.org/showthread.php?p=93942&postcount=35
  18. 175.
    Mantin, I.: A practical attack against RC4 in the WEP mode. In: Roy, B.K. (ed.) ASIACRYPT. LNCS, vol. 3788, pp. 395–411. Springer, Berlin (2005) Google Scholar
  19. 176.
    Mantin, I.: Predicting and distinguishing attacks on RC4 keystream generator. In: Cramer, R. (ed.) Advances in Cryptology—EUROCRYPT 2005. LNCS, vol. 3494, pp. 491–506. Springer, Berlin (2005) CrossRefGoogle Scholar
  20. 177.
    Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) Revised Papers from the 8th International Workshop on Fast Software Encryption. LNCS, vol. 2355, pp. 152–164. Springer, London (2001) CrossRefGoogle Scholar
  21. 182.
    Maximov, A., Khovratovich, D.: New State Recovering Attack on RC4. Technical report, Laboratory of Algorithmics, Cryptology and Security, University of Luxembourg (2008). http://eprint.iacr.org/2008/017
  22. 192.
    Mironov, I.: (Not so) random shuffles of RC4. In: Advances in Cryptology—CRYPTO 2002. LNCS, vol. 2442, pp. 304–319. Springer, Berlin (2002) CrossRefGoogle Scholar
  23. 194.
    Moen, V., Raddum, H., Hole, K.J.: Weakness in the temporal key hash of WPA. Mob. Comput. Commun. Rev. 8(2), 76–83 (2004) CrossRefGoogle Scholar
  24. 207.
    Paul, G., Maitra, S.: RC4 Stream Cipher and Its Variants. Discrete Mathematics and Its Applications. CRC Press, Boca Raton (2011) MATHGoogle Scholar
  25. 208.
    Paul, G.K.: Analysis and design of RC4 and its variants. PhD thesis, Department of Computer Science & Engineering, Jadavpur University, Kolkata, India (2008) Google Scholar
  26. 209.
    Paul, S., Preneel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: FSE 2004. LNCS, vol. 3017, pp. 245–259 (2004) Google Scholar
  27. 216.
    Pyshkin, A., Tews, E., Weinmann, R.P.: Breaking 104 bit WEP in less than 60 seconds. In: WISA. LNCS, vol. 4867, pp. 188–202 (2007). http://eprint.iacr.org/2007/120.pdf Google Scholar
  28. 221.
    Rivest, R.: RSA: Security response to weaknesses in key scheduling algorithm of RC4. Technical report, RSA Security, Inc. (2001). http://www.rsasecurity.com/rsalabs/technotes/wep.html
  29. 225.
    Robbins, D., Bolker, E.: The bias of three pseudo-random shuffles. Aecquationes Mathematicae 22, 268–292 (1981) MathSciNetMATHCrossRefGoogle Scholar
  30. 234.
    Schmidt, F., Simion, R.: Card shuffling and a transformation on S n. Aequations Mathematicae 44, 11–34 (1992) MathSciNetMATHCrossRefGoogle Scholar
  31. 256.
    Stanley, R.P.: Enumerative Combinatorics. Cambridge Studies in Advanced Mathematics, vol. 49. Cambridge University Press, Cambridge (1997) MATHCrossRefGoogle Scholar
  32. 258.
    Sterndark, D.: RC4 algorithm revealed. Usenet posting sternCVKL4B.Hyy@netcom.com. September 1994 Google Scholar
  33. 262.
    Tews, E.: Attacks on the WEP protocol. Master’s thesis, TU Darmstadt, Fachgebiet Theoretische Informatik (CDC) (2007) Google Scholar
  34. 263.
    Tews, E., Klein, A.: Attacks on Wireless LANs: About the security of IEEE 802.11 based wireless networks. Vdm Verlag Dr. Müller (2008) Google Scholar
  35. 284.
    Wu, H.: Cryptanalysis of a 32-bit RC4-like Stream Cipher. Technical report, Katholieke Universiteit Leuven, Dept. ESAT/COSIC (2005). http://eprint.iacr.org/2005/219.pdf

Copyright information

© Springer-Verlag London 2013

Authors and Affiliations

  • Andreas Klein
    • 1
  1. 1.Dept. of Pure Mathem. & Computer AlgebraState University of GhentGhentBelgium

Personalised recommendations