Cryptanalysis of RC4(n, m) stream cipher

Orumiehchiha, Mohammad Ali, Pieprzyk, Josef, Shakour, Elham, & Steinfeld, Ron (2013) Cryptanalysis of RC4(n, m) stream cipher. In Elçi, Atilla, Chefranov, Alexander, Gaur, Manoj Singh, Orgun, Mehmet A., Makarevich, Oleg B., & Çelik, Yasin (Eds.) SIN '13 Proceedings of the 6th International Conference on Security of Information and Networks, ACM, Aksaray, Turkey, pp. 165-172.

View at publisher


RC4(n, m) is a stream cipher based on RC4 and is designed by G. Gong et al. It can be seen as a generalization of the famous RC4 stream cipher designed by Ron Rivest. The authors of RC4(n, m) claim that the cipher resists all the attacks that are successful against the original RC4.

The paper reveals cryptographic weaknesses of the RC4(n, m) stream cipher. We develop two attacks. The first one is based on non-randomness of internal state and allows to distinguish it from a truly random cipher by an algorithm that has access to 24·n bits of the keystream. The second attack exploits low diffusion of bits in the KSA and PRGA algorithms and recovers all bytes of the secret key. This attack works only if the initial value of the cipher can be manipulated. Apart from the secret key, the cipher uses two other inputs, namely, initial value and initial vector. Although these inputs are fixed in the cipher specification, some applications may allow the inputs to be under the attacker control. Assuming that the attacker can control the initial value, we show a distinguisher for the cipher and a secret key recovery attack that for the L-bit secret key, is able to recover it with about (L/n) · 2n steps. The attack has been implemented on a standard PC and can reconstruct the secret key of RC(8, 32) in less than a second.

Impact and interest:

0 citations in Scopus
Search Google Scholar™

Citation counts are sourced monthly from Scopus and Web of Science® citation databases.

These databases contain citations from different subsets of available publications and different time periods and thus the citation count from each is usually different. Some works are not in either database and no count is displayed. Scopus includes citations from articles published in 1996 onwards, and Web of Science® generally from 1980 onwards.

Citations counts from the Google Scholar™ indexing service can be viewed at the linked Google Scholar™ search.

Full-text downloads:

63 since deposited on 03 Apr 2014
15 in the past twelve months

Full-text downloads displays the total number of times this work’s files (e.g., a PDF) have been downloaded from QUT ePrints as well as the number of downloads in the previous 365 days. The count includes downloads for all files if a work has more than one.

ID Code: 69677
Item Type: Conference Paper
Refereed: Yes
Keywords: RC4(n;m) Stream cipher, Cryptanalysis, Key Recovery Attack, Distinguishing Attack, RC4-like cipher, Weak Keys, Weak States
DOI: 10.1145/2523514.2523615
ISBN: 9781450324984
Divisions: Current > Schools > School of Electrical Engineering & Computer Science
Current > QUT Faculties and Divisions > Science & Engineering Faculty
Copyright Owner: Copyright 2013 ACM
Deposited On: 03 Apr 2014 03:41
Last Modified: 07 Apr 2014 15:02

Export: EndNote | Dublin Core | BibTeX

Repository Staff Only: item control page