A New Practical Key Recovery Attack on the Stream Cipher RC4 under Related-Key Model

抄録

A new key recovery attack under related-key model on RC4 is presented in this paper. This novel attack is based on the property that RC4 can generate a large amount of colliding key pairs. By making use of this property, we are able to recover any random key in practical time when the length of the key is large under a new proposed related key model. Differing from the attack against WEP, neither the nowledge of the IVs nor the keystream outputs are required. Also compared with some recent key recovery attacks, which assume that the attacker knows the S-Box after KSA algorithm and can only recover very short keys (5 bytes) efficiently, our attack works very well for keys with larger size. We give the theoretical proof for the complexity of our attack which matches with the experimental result very well. An 86-byte random secret key can be recovered in about 21.2 hours time by using a standard desktop PC. This novel attack provides us with another theoretical approach to attack WPA and WEP. Remark that our model can be used for more efficient key recovering if any new key collisions can be further discovered in the future.

Information Security and Cryptology, 6th International Conference, Inscrypt 2010, Shanghai, China, October 20-24, 2010, Revised Selected Papers

identifier:https://dspace.jaist.ac.jp/dspace/handle/10119/10291

収録刊行物

被引用文献 (1)*注記

もっと見る

詳細情報 詳細情報について

  • CRID
    1050564287491739648
  • NII論文ID
    120003752190
  • ISSN
    03029743
  • Web Site
    http://hdl.handle.net/10119/10291
  • 本文言語コード
    en
  • 資料種別
    journal article
  • データソース種別
    • IRDB
    • CiNii Articles

問題の指摘

ページトップへ