Abstract
RC4 is one of the most popular stream ciphers that generates pseudorandom words from pseudorandom permutations. In this paper we identify new bias for RC4 and its variants RC4A and VMPC, which are designed in a similar paradigm. Naturally, these biases provide new distinguishers for the pseudo-random keystream generated from these algorithms. In particular, our result provides the strongest distinguisher against VMPC. Although RC4A is of less practical interest, a lot of protocols use VMPC.









Similar content being viewed by others
References
AlFardan, N., Bernstein, D., Paterson, K., Poettering, B., Schuldt, J. On the security of RC4 in TLS. Published online at http://www.isg.rhul.ac.uk/tls/
Biham, E., Seberry. Py (Roo), J.: A Fast and Secure Stream Cipher using Rolling Arrays eSTREAM, ECRYPT Stream Cipher Project, Report 2005/023 (2005)
Biham, E., Seberry, J. : C Code of Py6. eSTREAM, ECRYPT Stream Cipher Project (2005). http://www.ecrypt.eu.org/stream/py.html
Fluhrer, S.R., McGrew, D.A.: Statistical Analysis of the Alleged RC4 Keystream Generator In: Proceedings of FSE 2000, LNCS, vol. 1978, pp 19–30. Springer (2000)
Gong, G., Gupta, K.C., Hell, M., Nawaz, Y.: Towards a General RC4-Like Keystream Generator In: Proceedings of CISC 2005, LNCS, vol. 3822, pp 162–174. Springer (2005)
Isobe, T., Ohigashi, T., Watanabe, Y., Morii, M.: Full plaintext recovery attack on broadcast RC4. To appear in proceedings of FSE (2013)
Jenkins, R. J. Jr.: ISAAC. In: Proceedings of FSE 1996, LNCS, vol. 1039, pp 41–49. Springer (1996)
Keller, N., Miller, S., Mironov, I., Venkatesan, R.: MV3: A New Word Based Stream Cipher Using Rapid Mixing and Revolving Buffers In: Proceedings of CT-RSA 2007, LNCS, vol. 4377, pp 1–19 (2007)
Maitra, S., Paul, G., Sen Gupta, S.: Attack on broadcast RC4 Revisited In: Proceedings of FSE 2011, LNCS, vol. 6733, pp 199–217. Springer (2011)
Mantin, I.: Analysis of the stream cipher RC4. Master’s thesis. The Weizmann Institute of Science, Israel (2001)
Mantin, I. : Predicting and Distinguishing Attacks on RC4 Keystream Generator In: Proceedings of Eurocrypt 2005, LNCS, vol. 3494, pp 491–506. Springer (2005)
Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4 In: Proceedings of FSE 2001, LNCS, vol. 2355, pp 152–164. Springer (2001)
Maximov, A.: Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness of the RC4 Family of Stream Ciphers In: Proceedings of FSE 2005, LNCS, vol. 3557, pp 342–358. Springer (2005)
Mironov, I.: (Not So) Random Shuffles of RC4 In: Proceedings of Crypto 2002, LNCS, vol. 2442, pp 304–319. Springer (2002)
Ohigashi, T., Isobe, T., Watanabe, Y., Morii, M.: How to Recover Any Byte of Plaintext on RC4. Accepted in SAC (2013)
Nawaz, Y., Gupta, K.C., Gong, G.: A 32-bit RC4-like Keystream Generator. Cryptology ePrint. Archive:2005/175
Paterson, K., Schuldt, J., Poettering, B.: Plaintext Recovery Attacks Against WPA/TKIP. Accepted in FSE (2014)
Paul, S., Preneel, B.: A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher In: Proceedings of FSE 2004, LNCS, vol. 3017, pp 245–259. Springer (2004)
Paul, S., Preneel, B., Sekar, G.: Distinguishing Attacks on the Stream Cipher Py In: Proceedings of FSE 2006, LNCS, vol. 4047, pp 405–421. Springer (2006)
Paul, S., Preneel, B.: On the (In)security of Stream Ciphers Based on Arrays and Modular Addition In: Proceedings of Asiacrypt 2006, LNCS, vol. 4284, pp 69–73. Springer (2006)
Sepehrdad, P.: Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives. Ph.D. thesis, École Polytechnique Fédérale de Lausanne (EPFL), 2012. http://lasecwww.epfl.ch/~sepehrdad/Pouyan_Sepehrdad_PhD_Thesis.pdf
Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Discovery and Exploitation of New Biases in RC4 In: Proceedings of SAC 2010, LNCS, vol. 6544, pp 74–91. Springer (2010)
Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Statistical Attack on RC4 – Distinguishing WPA In: Proceedings of EUROCRYPT 2011, LNCS, vol. 6632, pp 343–363. Springer (2011)
Tsunoo, Y., Saito, T., Kubo, H., Shigeri, M., Suzaki, T., Kawabata, T.: The Most Efficient Distinguishing Attack on VMPC and RC4A. In: Proceedings of SKEW (2005)
Zoltak, B.: VMPC One-Way Function and Stream Cipher In: Proceedings of FSE 2004, LNCS, vol. 3017, pp 210–225. Springer (2004)
Zoltak, B.: Personal communication
Author information
Authors and Affiliations
Corresponding author
Additional information
This is a thoroughly revised and extended version of the paper “Further Non-randomness in RC4, RC4A and VMPC” that has been presented in WCC 2013, April 15–19, 2013, Bergen, Norway. There is no formal proceedings for WCC 2013. Section 4 of this paper is the additional contribution that was not appeared in the workshop version.
Rights and permissions
About this article
Cite this article
Sarkar, S. Further non-randomness in RC4, RC4A and VMPC. Cryptogr. Commun. 7, 317–330 (2015). https://doi.org/10.1007/s12095-014-0119-0
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12095-014-0119-0