Abstract
In this paper we present an efficient algorithm for the retrieval of the RC4 secret key, given an internal state. This algorithm is several orders of magnitude faster than previously published algorithms. In the case of a 40-bit key, it takes only about 0.02 seconds to retrieve the key, with success probability of 86.4%. Even if the algorithm cannot retrieve the entire key, it can retrieve partial information about the key. The key can also be retrieved if some of the bytes of the initial permutation are incorrect or missing.
This work was supported in part by the Israel MOD Research and Technology Unit.
Chapter PDF
Similar content being viewed by others
References
Anonymous, RC4 Source Code, CypherPunks mailing list, September 9 (1994), http://cypherpunks.venona.com/date/1994/09/msg00304.html
Biham, E., Granboulan, L., Nguy\(\tilde{\mbox{\^e}}\)n, P.Q.: Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol. 3557, pp. 359–367. Springer, Heidelberg (2005)
Dierks, T., Allen, C.: The TLS Protocol, Version 1.0, Internet Engineering Task Force (January 1999), ftp://ftp.isi.edu/in-notes/rfc2246.txt
Finney, H.: An RC4 Cycle That Can’t Happen, Usenet newsgroup sci.crypt (September 1994)
Fluhrer, S., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol. 2259, pp. 1–24. Springer, Heidelberg (2001)
Fluhrer, S.R., McGrew, D.A.: Statistical Analysis of the Alleged RC4 Keystream Generator. In: Schneier, B. (ed.) FSE 2000. LNCS, vol. 1978, pp. 19–30. Springer, Heidelberg (2001)
Golić, J.D.: Linear Statistical Weakness of Alleged RC4 Keystream Generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol. 1233, pp. 226–238. Springer, Heidelberg (1997)
Grosul, A.L., Wallach, D.S.: A Related-Key Cryptanalysis of RC4, Technical Report TR-00-358, Department of Computer Science, Rice University (June 2000), http://cohesion.rice.edu/engineering/computerscience/tr/TR_Download.cfm?SDID=126
Halderman, J.A., Schoen, S.D., Heninger, N., Clarkson, W., Paul, W., Calandrino, J.A., Feldman, A.J., Appelbaum, J., Felten, E.W.: Lest We Remember: Cold Boot Attacks on Encryption Keys (February 2008), http://citp.princeton.edu/pub/coldboot.pdf
Klein, A.: Attacks on the RC4 Stream Cipher (2007), http://cage.ugent.be/~klein/RC4/RC4-en.ps
Knudsen, L.R., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis Methods for (Alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol. 1514, pp. 327–341. Springer, Heidelberg (1998)
Mantin, I.: Analysis of the Stream Cipher RC4, Master Thesis, The Weizmann Institute of Science, Israel (2001), http://www.wisdom.weizmann.ac.il/~itsik/RC4/Papers/Mantin1.zip
Mantin, I.: Predicting and Distinguishing Attacks on RC4 Keystream Generator. In: Cramer, R.J.F. (ed.) EUROCRYPT 2005. LNCS, vol. 3494, pp. 491–506. Springer, Heidelberg (2005)
Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol. 2355, pp. 152–164. Springer, Heidelberg (2002)
Paul, G., Maitra, S.: Permutation After RC4 Key Scheduling Reveals the Secret Key. In: Proceedings of Selected Areas in Cryptography. LNCS, vol. 4876, pp. 260–377. Springer, Heidelberg (to appear, 2007), http://eprint.iacr.org/2007/208.pdf
Roos, A.: A Class of Weak Keys in the RC4 Stream Cipher, Two posts in sci.crypt (1995), http://marcel.wanda.ch/Archive/WeakKeys
Tews, E., Weinmann, R.P., Pyshkin, A.: Breaking 104 Bit WEP in Less than 60 Seconds (2007), http://eprint.iacr.org/2007/120.pdf
Vaudenay, S., Vuagnoux, M.: Passive-only Key Recovery Attacks on RC4. In: Proceedings of Selected Areas in Cryptography. LNCS, vol. 4876, pp. 344–359. Springer, Heidelberg (to appear, 2007), http://infoscience.epfl.ch/record/115086/files/VV07.pdf
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 2008 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biham, E., Carmeli, Y. (2008). Efficient Reconstruction of RC4 Keys from Internal States. In: Nyberg, K. (eds) Fast Software Encryption. FSE 2008. Lecture Notes in Computer Science, vol 5086. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-71039-4_17
Download citation
DOI: https://doi.org/10.1007/978-3-540-71039-4_17
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-71038-7
Online ISBN: 978-3-540-71039-4
eBook Packages: Computer ScienceComputer Science (R0)