Skip to main content

Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator

  • Conference paper
Information Security and Privacy (ACISP 2000)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 1841))

Included in the following conference series:

Abstract

An iterative probabilistic method for reconstructing the initial state of RC4 keystream generator from a short segment of the keystream sequence is developed. The cryptanalytic algorithm consists of a forward and backward recursive computation of the posterior probabilities of the internal state components given a keystream segment. While maintaining the computational complexity, the new method presents a theoretical and practical improvement of a recently proposed method of a similar type, as less entries of the initial table are required to be known for the attack to be successful. If these entries have to be guessed, then the attack is expected to remain infeasible for the recommended word size of RC4.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Bahl, L.R., Cocke, J., Jelinek, F., Raviv, J.: Optimal decoding of linear codes for minimizing symbol error rate. IEEE Trans. Inform. Theory IT-20, 284–287 (1974)

    Article  MathSciNet  Google Scholar 

  2. Golić, J.D.: Linear models for keystream generators. IEEE Trans. Computers C-45, 41–49 (1996)

    Google Scholar 

  3. Golić, J.D.: Linear statistical weakness of alleged RC4 keystream generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 226–238. Springer, Heidelberg (1997)

    Google Scholar 

  4. Golić, J.D.: Recent advances in stream cipher cryptanalysis. Publications de l’Institut Mathematique 64/78, 183–204 (1998)

    Google Scholar 

  5. Golić, J.D.: Linear models for a time-variant permutation generator. IEEE Trans. Inform. Theory IT-45, 2374–2382 (1999)

    Google Scholar 

  6. Knudsen, L., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis me- thods for (alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 327–341. Springer, Heidelberg (1998)

    Chapter  Google Scholar 

  7. Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Boca Raton (1997)

    MATH  Google Scholar 

  8. Rivest, R.L.: The RC4 encryption algorithm. RSA Data Security, Inc. (March 1992)

    Google Scholar 

  9. Schneier, B.: Applied Cryptography. Wiley, Chichester (1996)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2000 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Golić, J.D. (2000). Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. In: Dawson, E.P., Clark, A., Boyd, C. (eds) Information Security and Privacy. ACISP 2000. Lecture Notes in Computer Science, vol 1841. Springer, Berlin, Heidelberg. https://doi.org/10.1007/10718964_18

Download citation

  • DOI: https://doi.org/10.1007/10718964_18

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-67742-0

  • Online ISBN: 978-3-540-45030-6

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics