Abstract
Over the past few years, an attractive design paradigm has emerged, that aims to produce new stream cipher designs, by combining one or more independently produced RC4 states. The ciphers so produced turn out to be faster than RC4 on any software platform, mainly because the average number of internal operations used in the cipher per byte of keystream produced is usually lesser than RC4. One of the main efforts of the designers is to ensure that the existing weaknesses of RC4 are not carried over to the new ciphers so designed. In this work we will look at two such ciphers RC4B (proposed by Zhang et. al.) and Quad-RC4/m-RC4 (proposed by Maitra et. al.). We will propose distinguishing attacks against all these ciphers, and look at certain design flaws that made these ciphers vulnerable.
Original language | English |
---|---|
Title of host publication | Proceedings of the 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2015) |
Editors | Rajat Subhra Chakraborty, Peter Schwabe, Jon Solworth |
Publisher | Springer |
Publication date | 2015 |
Pages | 95-112 |
ISBN (Print) | 978-3-319-24125-8 |
ISBN (Electronic) | 978-3-319-24126-5 |
DOIs | |
Publication status | Published - 2015 |
Event | 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2015) - Jaipur, Rajasthan, India Duration: 3 Oct 2015 → 7 Oct 2015 Conference number: 5 http://cse.iitkgp.ac.in/conf/SPACE2015/ |
Conference
Conference | 5th International Conference on Security, Privacy, and Applied Cryptography Engineering (SPACE 2015) |
---|---|
Number | 5 |
Country/Territory | India |
City | Jaipur, Rajasthan |
Period | 03/10/2015 → 07/10/2015 |
Internet address |
Series | Lecture Notes in Computer Science |
---|---|
Volume | 9354 |
ISSN | 0302-9743 |
Keywords
- RC4
- RC4B
- Quad-RC4
- m-RC4
- Distinguishing Attacks
- Stream Cipher