Abstract
RC4 is a widely used cipher designed for 8-bit processors. It is part of the wireless LAN standards WEP and WPA. The chapter starts with the analysis of these protocols and show how protocol failures helps the attacker. Then we analyse RC4 in detail with a special focus on the weak key scheduling. We will learn how to break RC4 if carelessly used and we will learn how to use it in a secure way. We will also have a look on some variations of RC4 and see how to transfer attacks against RC4 to its variants.
References
- 4.Aircrack-ng a toolsuite. http://www.aircrack-ng.org
- 7.Arbaugh, W.A.: An inductive chosen plaintext attack against WEP/WEP2 (2001). http://www.cs.umd.edu/~waa/attack/v3dcmnt.htm
- 79.Diaconis, A.: In: Group Representations in Probability and Statistics. Lecture Notes-Monographs Series, vol. 11. IMS, Hayward (1988) Google Scholar
- 93.Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Selected Areas in Cryptography. LNCS, vol. 2259, pp. 1–24. Springer, Berlin (2001) CrossRefGoogle Scholar
- 95.Fluhrer, S.R., McGrew, D.A.: Statistical analysis of the alleged RC4 keystream generator. In: Proceedings of the 7th International Workshop on Fast Software Encryption. LNCS, vol. 1978, pp. 19–20. Springer, Berlin (2000) CrossRefGoogle Scholar
- 108.Goldstein, D., Moews, D.: The identity is the most likely exchange shuffle for large n. Aequ. Math. 65(1–2), 3–30 (2003) MathSciNetMATHGoogle Scholar
- 110.Golić, J.Dj.: Linear statistical weakness of alleged RC4 keystream generator. In: Advances in Cryptology—EUROCRYPTO ’97. LNCS, vol. 1233, pp. 226–238. Springer, Berlin (1997) Google Scholar
- 111.Golić, J.Dj.: Linear models for a time-variant-permutation generator. IEEE Trans. Inf. Theory 45(7), 2374–2382 (1999) MATHCrossRefGoogle Scholar
- 112.Golić, J.Dj.: Iterative probabilistic cryptanalysis of RC4 keystream generator. In: ACISP 2000, pp. 220–233 (2000) Google Scholar
- 116.Gong, G., Gupta, K.C., Hell, M., Nawaz, Y.: Towards a general RC4-like keystream generator. In: Information Security and Cryptology. Lecture Notes in Comput. Sci., vol. 3822, pp. 162–174. Springer, Berlin (2005) CrossRefGoogle Scholar
- 121.Gupta, K., Gong, G., Nawaz, Y.: A 32-bit RC4-like keystream generator. Technical Report CACR 2005-21, Center for Applied Cryptographic Research, University of Waterloo, 2005. http://www.cacr.math.uwaterloo.ca/tech_reports.html
- 133.Hulton, D.: Practical exploration of RC4 weaknesses in WEP environments. Presented at HiverCon (2002) Google Scholar
- 148.Klein, A.: Attacks against the RC4 stream cipher. Des. Codes Cryptogr. 48, 269–286 (2008) MathSciNetMATHCrossRefGoogle Scholar
- 149.Knudsen, L.R., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis methods for (alleged) RC4. In: Ohta, K., Pei, D. (eds.) Advances in Cryptology—ASIACRYPT’98. Lecture Notes in Computer Science, vol. 1998, pp. 327–341. Springer, Berlin (1998) Google Scholar
- 152.Knuth, D.E.: The Art of Computer Programming, vol. 2. Seminumerical Algorithms, 3rd edn. Addison-Wesley, Reading (1998) MATHGoogle Scholar
- 164.KoreK: chopchop (experimental WEP attacks) (2004). http://www.netstumbler.org/showthread.php?t=12489
- 165.KoreK: Next generation of WEP attacks? (2004). http://www.netstumbler.org/showthread.php?p=93942&postcount=35
- 175.Mantin, I.: A practical attack against RC4 in the WEP mode. In: Roy, B.K. (ed.) ASIACRYPT. LNCS, vol. 3788, pp. 395–411. Springer, Berlin (2005) Google Scholar
- 176.Mantin, I.: Predicting and distinguishing attacks on RC4 keystream generator. In: Cramer, R. (ed.) Advances in Cryptology—EUROCRYPT 2005. LNCS, vol. 3494, pp. 491–506. Springer, Berlin (2005) CrossRefGoogle Scholar
- 177.Mantin, I., Shamir, A.: A practical attack on broadcast RC4. In: Matsui, M. (ed.) Revised Papers from the 8th International Workshop on Fast Software Encryption. LNCS, vol. 2355, pp. 152–164. Springer, London (2001) CrossRefGoogle Scholar
- 182.Maximov, A., Khovratovich, D.: New State Recovering Attack on RC4. Technical report, Laboratory of Algorithmics, Cryptology and Security, University of Luxembourg (2008). http://eprint.iacr.org/2008/017
- 192.Mironov, I.: (Not so) random shuffles of RC4. In: Advances in Cryptology—CRYPTO 2002. LNCS, vol. 2442, pp. 304–319. Springer, Berlin (2002) CrossRefGoogle Scholar
- 194.Moen, V., Raddum, H., Hole, K.J.: Weakness in the temporal key hash of WPA. Mob. Comput. Commun. Rev. 8(2), 76–83 (2004) CrossRefGoogle Scholar
- 207.Paul, G., Maitra, S.: RC4 Stream Cipher and Its Variants. Discrete Mathematics and Its Applications. CRC Press, Boca Raton (2011) MATHGoogle Scholar
- 208.Paul, G.K.: Analysis and design of RC4 and its variants. PhD thesis, Department of Computer Science & Engineering, Jadavpur University, Kolkata, India (2008) Google Scholar
- 209.Paul, S., Preneel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: FSE 2004. LNCS, vol. 3017, pp. 245–259 (2004) Google Scholar
- 216.Pyshkin, A., Tews, E., Weinmann, R.P.: Breaking 104 bit WEP in less than 60 seconds. In: WISA. LNCS, vol. 4867, pp. 188–202 (2007). http://eprint.iacr.org/2007/120.pdf Google Scholar
- 221.Rivest, R.: RSA: Security response to weaknesses in key scheduling algorithm of RC4. Technical report, RSA Security, Inc. (2001). http://www.rsasecurity.com/rsalabs/technotes/wep.html
- 225.Robbins, D., Bolker, E.: The bias of three pseudo-random shuffles. Aecquationes Mathematicae 22, 268–292 (1981) MathSciNetMATHCrossRefGoogle Scholar
- 234.Schmidt, F., Simion, R.: Card shuffling and a transformation on S n. Aequations Mathematicae 44, 11–34 (1992) MathSciNetMATHCrossRefGoogle Scholar
- 256.Stanley, R.P.: Enumerative Combinatorics. Cambridge Studies in Advanced Mathematics, vol. 49. Cambridge University Press, Cambridge (1997) MATHCrossRefGoogle Scholar
- 258.Sterndark, D.: RC4 algorithm revealed. Usenet posting sternCVKL4B.Hyy@netcom.com. September 1994 Google Scholar
- 262.Tews, E.: Attacks on the WEP protocol. Master’s thesis, TU Darmstadt, Fachgebiet Theoretische Informatik (CDC) (2007) Google Scholar
- 263.Tews, E., Klein, A.: Attacks on Wireless LANs: About the security of IEEE 802.11 based wireless networks. Vdm Verlag Dr. Müller (2008) Google Scholar
- 284.Wu, H.: Cryptanalysis of a 32-bit RC4-like Stream Cipher. Technical report, Katholieke Universiteit Leuven, Dept. ESAT/COSIC (2005). http://eprint.iacr.org/2005/219.pdf
Copyright information
© Springer-Verlag London 2013