Discovery and Exploitation of New Biases in RC4

  • Pouyan Sepehrdad
  • Serge Vaudenay
  • Martin Vuagnoux
Conference paper

DOI: 10.1007/978-3-642-19574-7_5

Part of the Lecture Notes in Computer Science book series (LNCS, volume 6544)
Cite this paper as:
Sepehrdad P., Vaudenay S., Vuagnoux M. (2011) Discovery and Exploitation of New Biases in RC4. In: Biryukov A., Gong G., Stinson D.R. (eds) Selected Areas in Cryptography. SAC 2010. Lecture Notes in Computer Science, vol 6544. Springer, Berlin, Heidelberg

Abstract

In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known KSA weaknesses to provide practical key recovery attacks. Henceforth, we apply a similar technique on RC4 as a black box, i.e. the secret key words as input and the keystream words as output. Our objective is to exhaustively find linear correlations between these elements. Thanks to this technique, 9 new exploitable correlations have been revealed. Finally, we exploit these weaknesses on RC4 to some practical examples, such as the WEP protocol. We show that these correlations lead to a key recovery attack on WEP with only 9800 encrypted packets (less than 20 seconds), instead of 24200 for the best previous attack.

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Pouyan Sepehrdad
    • 1
  • Serge Vaudenay
    • 1
  • Martin Vuagnoux
    • 1
  1. 1.EPFLLausanneSwitzerland

Personalised recommendations