New Weakness in the Key-Scheduling Algorithm of RC4

  • OHIGASHI Toshihiro
    Graduate School of Science and Technology, Kobe University The Institute of Electronics, Information and Communication Engineers
  • SHIRAISHI Yoshiaki
    Department of Computer Science and Engineering, Nagoya Institute of Technology The Institute of Electronics, Information and Communication Engineers
  • MORII Masakatu
    Faculty of Engineering, Kobe University The Institute of Electronics, Information and Communication Engineers

この論文をさがす

抄録

In a key scheduling algorithm (KSA) of stream ciphers, a secret key is expanded into a large initial state. An internal state reconstruction method is known as a general attack against stream ciphers; it recovers the initial state from a given pair of plaintext and ciphertext more efficiently than exhaustive key search. If the method succeeds, then it is desirable that the inverse of KSA is infeasible in order to avoid the leakage of the secret key information. This paper shows that it is easy to compute a secret key from an initial state of RC4. We propose a method to recover an l-bit secret key from only the first l bits of the initial state of RC4 using linear equations with the time complexity less than that of one execution of KSA. It can recover the secret keys of which number is 2103.6 when the size of the secret key is 128bits. That is, the 128-bit secret key can be recovered with a high probability when the first 128bits of the initial state are determined using the internal state reconstruction method.

収録刊行物

被引用文献 (4)*注記

もっと見る

参考文献 (40)*注記

もっと見る

詳細情報 詳細情報について

問題の指摘

ページトップへ