Measuring Avalanche Properties on RC4 Stream Cipher Variants

In the last three decades, the RC4 has been the most cited stream cipher, due to a large amount of research carried out on its operation. In this sense, dissimilar works have been presented on its performance, security, and usability. One of the distinguishing features that stand out the most is the sheer number of RC4 variants proposed. Recently, a weakness has been reported regarding the existence of statistical dependence between the inputs and outputs of the RC4, based on the use of the strict avalanche criterion and the bit independence criterion. This work analyzes the influence of this weakness in some of its variants concerning RC4. The five best-known variants of RC4 were compared experimentally and classified into two groups according to the presence or absence of such a weakness.

[1]  Wei Zhang,et al.  Chaotic Stream Cipher-Based Secure Data Communications over Intelligent Transportation Network , 2015 .

[2]  Kenji Yoshigoe,et al.  RC4-2S: RC4 Stream Cipher with Two State Tables , 2013, ITCS.

[3]  L. M. Jenila Livingston,et al.  A Comprehensive Survey on SSL/ TLS and their Vulnerabilities , 2016 .

[4]  Sura M. Searan,et al.  Modification of RC4 Algorithm by using Two State Tables and Initial State Factorial , 2016 .

[5]  Guang Gong,et al.  A 32-bit RC4-like Keystream Generator , 2005, IACR Cryptol. ePrint Arch..

[6]  Donald E. Knuth,et al.  The Art of Computer Programming, Vol. 3: Sorting and Searching , 1974 .

[7]  Atsuko Miyaji,et al.  Generalized Analysis on Key Collisions of Stream Cipher RC4 , 2011, IEICE Trans. Fundam. Electron. Commun. Comput. Sci..

[8]  Zhonglin Zhang,et al.  A New Private Information Encryption Method in Internet of Things under Cloud Computing Environment , 2020, Wirel. Commun. Mob. Comput..

[9]  Ilya Mironov,et al.  (Not So) Random Shuffles of RC4 , 2002, IACR Cryptol. ePrint Arch..

[10]  Ali Makki Sagheer,et al.  Developing RC4 Algorithm Using S-Box of Advanced Encryption Standard Cipher , 2018 .

[11]  Donghoon Chang,et al.  RC4-Hash: A New Hash Function Based on RC4 , 2006, INDOCRYPT.

[12]  Pierre L'Ecuyer,et al.  TestU01: A C library for empirical testing of random number generators , 2006, TOMS.

[13]  Omar Rojas,et al.  Measuring Independence between Statistical Randomness Tests by Mutual Information , 2020, Entropy.

[14]  E. J. Madarro Capó,et al.  Evaluation of input — output statistical dependence PRNGs by SAC , 2016, 2016 International Conference on Software Process Improvement (CIMPS).

[15]  V. Kamakshi Prasad,et al.  Performance and Statistical Analysis of Stream ciphers in GSM Communications , 2020 .

[16]  Javaid A. Sheikh,et al.  Information hiding in edges: A high capacity information hiding technique using hybrid edge detection , 2016, Multimedia Tools and Applications.

[17]  Bin Zhang,et al.  Distinguishing Attacks on RC4 and A New Improvement of the Cipher , 2013, IACR Cryptol. ePrint Arch..

[18]  Guillermo Sosa-Gómez,et al.  Bit Independence Criterion Extended to Stream Ciphers , 2020 .

[19]  Melek D. Yücel,et al.  Avalanche and Bit Independence Properties for the Ensembles of Randomly Chosen n \times n S-Boxes , 2001 .

[20]  Mitsuru Matsui Key Collisions of the RC4 Stream Cipher , 2009, FSE.

[21]  Dengguo Feng,et al.  Stream cipher designs: a review , 2020, Science China Information Sciences.

[22]  Goutam Paul,et al.  Quad-RC4: Merging Four RC4 States towards a 32-bit Stream Cipher , 2013, IACR Cryptol. ePrint Arch..

[23]  Stefania Loredana Nita,et al.  Security and Cryptographic Challenges for Authentication Based on Biometrics Data , 2018, Cryptogr..