A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model
抄録
A new key recovery attack under related-key model on RC4 is presented in this paper. This novel attack is based on the property that RC4 can generate a large amount of colliding key pairs. By making use of this property, we are able to recover any random key in practical time when the length of the key is large under a new proposed related key model. Differing from the attack against WEP, neither the nowledge of the IVs nor the keystream outputs are required. Also compared with some recent key recovery attacks, which assume that the attacker knows the S-Box after KSA algorithm and can only recover very short keys (5 bytes) efficiently, our attack works very well for keys with larger size. We give the theoretical proof for the complexity of our attack which matches with the experimental result very well. An 86-byte random secret key can be recovered in about 21.2 hours time by using a standard desktop PC. This novel attack provides us with another theoretical approach to attack WPA and WEP. Remark that our model can be used for more efficient key recovering if any new key collisions can be further discovered in the future.
Information Security and Cryptology, 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers
identifier:https://dspace.jaist.ac.jp/dspace/handle/10119/10291
収録刊行物
-
- Lecture Notes in Computer Science
-
Lecture Notes in Computer Science 6584/2011 62-76, 2011-07-19
Springer
- Tweet
詳細情報 詳細情報について
-
- CRID
- 1050564287491739648
-
- NII論文ID
- 120003752190
-
- ISSN
- 03029743
-
- Web Site
- http://hdl.handle.net/10119/10291
-
- 本文言語コード
- en
-
- 資料種別
- journal article
-
- データソース種別
-
- IRDB
- CiNii Articles