Generalized Classes of Weak Keys on RC4 Using Predictive State

Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using generalized relational equations and special classes of the internal state (called predictive state). We derive the probability that generalized classes of weak keys leak the information of bytes of the secret key. Furthermore, we enumerate the generalized classes of weak keys and show that most of them leak more information of the secret key than Roos' one.

[1]  Voon Chin Phua,et al.  Wireless lan medium access control (mac) and physical layer (phy) specifications , 1999 .

[2]  Scott R. Fluhrer,et al.  Statistical Analysis of the Alleged RC4 Keystream Generator , 2000, FSE.

[3]  염흥렬,et al.  [서평]「Applied Cryptography」 , 1997 .

[4]  Serge Vaudenay,et al.  Passive-Only Key Recovery Attacks on RC4 , 2007, Selected Areas in Cryptography.

[5]  Itsik Mantin,et al.  Predicting and Distinguishing Attacks on RC4 Keystream Generator , 2005, EUROCRYPT.

[6]  Hidenori Kuwakado,et al.  Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets , 2010, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[7]  Goutam Paul,et al.  Permutation After RC4 Key Scheduling Reveals the Secret Key , 2007, Selected Areas in Cryptography.

[8]  Andreas Klein,et al.  Attacks on the RC4 stream cipher , 2008, Des. Codes Cryptogr..

[9]  Vincent Rijmen,et al.  Analysis Methods for (Alleged) RC4 , 1998, ASIACRYPT.

[10]  Bart Preneel,et al.  Analysis of Non-fortuitous Predictive States of the RC4 Keystream Generator , 2003, INDOCRYPT.

[11]  Rafik Chaabouni Break WEP Faster with Statistical Analysis , 2013, IACR Cryptol. ePrint Arch..

[12]  Adi Shamir,et al.  A Practical Attack on Broadcast RC4 , 2001, FSE.

[13]  Erik Tews,et al.  Breaking 104 Bit WEP in Less Than 60 Seconds , 2007, WISA.

[14]  Masakatu Morii,et al.  New Weakness in the Key-Scheduling Algorithm of RC4 , 2008, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[15]  Eli Biham,et al.  Efficient Reconstruction of RC4 Keys from Internal States , 2008, FSE.

[16]  Wi-Fi Alliance,et al.  Wi-Fi protected access , 2003 .

[17]  Goutam Paul,et al.  RC4 State Information at Any Stage Reveals the Secret Key , 2007, IACR Cryptol. ePrint Arch..

[18]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.