Abstract
An iterative probabilistic method for reconstructing the initial state of RC4 keystream generator from a short segment of the keystream sequence is developed. The cryptanalytic algorithm consists of a forward and backward recursive computation of the posterior probabilities of the internal state components given a keystream segment. While maintaining the computational complexity, the new method presents a theoretical and practical improvement of a recently proposed method of a similar type, as less entries of the initial table are required to be known for the attack to be successful. If these entries have to be guessed, then the attack is expected to remain infeasible for the recommended word size of RC4.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Bahl, L.R., Cocke, J., Jelinek, F., Raviv, J.: Optimal decoding of linear codes for minimizing symbol error rate. IEEE Trans. Inform. Theory IT-20, 284–287 (1974)
Golić, J.D.: Linear models for keystream generators. IEEE Trans. Computers C-45, 41–49 (1996)
Golić, J.D.: Linear statistical weakness of alleged RC4 keystream generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 226–238. Springer, Heidelberg (1997)
Golić, J.D.: Recent advances in stream cipher cryptanalysis. Publications de l’Institut Mathematique 64/78, 183–204 (1998)
Golić, J.D.: Linear models for a time-variant permutation generator. IEEE Trans. Inform. Theory IT-45, 2374–2382 (1999)
Knudsen, L., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis me- thods for (alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 327–341. Springer, Heidelberg (1998)
Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)
Rivest, R.L.: The RC4 encryption algorithm. RSA Data Security, Inc. (March 1992)
Schneier, B.: Applied Cryptography. Wiley, Chichester (1996)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2000 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Golić, J.D. (2000). Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_18
Download citation
DOI: https://doi.org/10.1007/10718964_18
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-67742-0
Online ISBN: 978-3-540-45030-6
eBook Packages: Springer Book Archive