2013 | OriginalPaper | Buchkapitel
Security Analysis of the RC4+ Stream Cipher
verfasst von : Subhadeep Banik, Santanu Sarkar, Raghu Kacker
Erschienen in: Progress in Cryptology – INDOCRYPT 2013
Verlag: Springer International Publishing
Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.
Wählen Sie Textabschnitte aus um mit Künstlicher Intelligenz passenden Patente zu finden. powered by
Markieren Sie Textabschnitte, um KI-gestützt weitere passende Inhalte zu finden. powered by
The
RC4+
stream cipher was proposed by Maitra and Paul at Indocrypt 2008. The authors had claimed that
RC4+
ironed out most of the weaknesses of the alleged
RC4
stream cipher and was only marginally slower than
RC4
in software. In this paper we show that it is possible to mount a distinguishing attack on
RC4+
based on the bias of the first output byte. The distinguisher requires around 2
26
samples produced by different keys of
RC4+
. In the second part of the paper we study the possibility of mounting the differential fault attack on
RC4
proposed by Biham et. al. in FSE 2005, on
RC4+
. We will show that that the
RC4+
is vulnerable to differential fault attack and it is possible to recover the entire internal state of the cipher at the beginning of the PRGA by injecting around 2
17.2
faults.