期刊文献+

对不同种子密钥长度的RC4算法的明文恢复攻击 被引量:4

Plaintext recovery attack on RC4 with different length of seed key
下载PDF
导出
摘要 针对不同种子密钥长度的RC4算法的明文恢复问题,提出了对经过不同种子密钥长度(8字节、16字节、22字节)的RC4算法加密的明文的明文恢复攻击。首先利用统计算法在2^(32)个不同种子密钥的条件下统计了RC4算法每个密钥流输出字节的t值分布,发现了RC4算法密钥流输出序列存在偏差;然后,利用单字节偏差规律和双字节偏差规律给出了对经RC4算法加密的明文的前256字节的攻击算法。实验结果表明,在密文量为2^(31)的条件下,除了第4字节外,攻击算法能够以100%的成功率恢复明文的前196字节。对于种子密钥长度为8字节的RC4算法,前256字节的恢复成功率都超过了91%;相应的,种子密钥长度为16字节的RC4算法,前256字节的恢复成功率都超过87%;种子密钥长度为22字节的RC4算法,前256字节的恢复成功率都超过了81%。所提攻击算法拓展了原有攻击密钥长度为16字节的RC4算法的范围,且在实际应用中能够更好地恢复经RC4算法加密的明文。 Aiming at the plaintext recovery on plaintexts encrypted by RC4( Rivest Cipher 4) algorithm with different lengths of seed key, a plaintext recovery attack on plaintexts encrypted by RC4 algorithm with different lengths of seed key( 8 bytes, 16 bytes, 22 bytes) was proposed. Firstly, by using the statistical algorithm, the t-value distribution of each output byte of key stream of RC4 was calculated under the condition of 2^(32) different seed keys, and biases were found. Then the attack on the first 256 bytes of the plaintext encrypted by the RC4 was given by using single-byte biases and double-bytes biases. The experimental results show that with 2^(31) ciphertexts, the first 196 bytes of the plaintext can be recovered with the success probability of 100% except the 4th Byte. Besides, the first 256 bytes can be recovered with the success probability over 91%,87% and 81% for 8-byte, 16-byte and 22-byte seed key, respectively. The proposed attack algorithm extends the scope of RC4 algorithm with seed key length of 16 bytes, and it can recover the plaintexts encrypted by RC4 algorithm in practice.
出处 《计算机应用》 CSCD 北大核心 2018年第2期370-373,共4页 journal of Computer Applications
基金 国家重点研发计划项目(2016YFB0800101 2016YFB0800100) 数学与先进计算国家重点实验室开放课题项目(2015A14)~~
关键词 RC4算法 流密码 种子密钥长度 明文恢复 偏差规律 RC4(Rivest Cipher 4) algorithm stream cipher seed key length plaintext recovery biases
  • 相关文献

参考文献5

二级参考文献43

  • 1Roos A.A class of weak keys in the RC4 stream cipher.Two Posts in Sci Crypt,message-id:43uleh$1j3@hermes.is.co.za and 44ebge $11f@hermes.is.co.za, 1995.
  • 2Fluhrer,Mantin,Shamir.Weaknesses in the key scheduling algorithm of RC4[C]//Selected Areas in Cryptography:8th Annum International Workshop, SAC 2001, Canada, August, 2001.New York: Springer, 2001,2259 : 1-24.
  • 3Golic.Linear statistical weakness of alleged RC4 keystream generator[C]//Advances in Cryptology-EUROCRYPT'97,EUROCRYPT'97, Germany, May, 1997.Berlin : Springer-Verlag, 1998,1233:226-238.
  • 4Fluhrer,McGrew.Statistical analysis of the alleged RC4 keystream generator[C]//Proceedings of the 7th International Workshop on Fast Software Encryption, FSE 2000, USA, November 6 -10,2000.New York : Springer, 2000,1978 : 19-30.
  • 5Knudsen,Meier,Preneel,et al.Analysis methods for(alleged)RC4[C]// Advances in Cryptology-ASIACRYPT'98,ASIACRYPT'98,Beijing, October, 1998.Beljing: Springer-Verlag, 1998,1514:327-341.
  • 6Mantin I.The security of the stream cipher RC4[D].Rehovot Israel: The Weizmann Institute of Science,2001.
  • 7Murphy S. The Power of NIST's Statistical Testing of AES Candidates[Z]. (2000-03-07). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.8668.
  • 8Andrew R. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptogrophic Applications[Z]. (2000-12-08). http ://csrc.nist.gov/groups/ST/toolkit/rng/index.html.
  • 9Fluhrer S,MCGrew D.Statistical Analysis of the Alleged RC4 Keystream Generator[C]//Proc.of Fast Software Encryption Conference.New York,USA:Springer-Verlag,2000.
  • 10Matin I.Predicdng and Distinguishing Attack on RC4 Keystream Generator[C]//Proc.of Eurocrypt'05.Aarhus,Denmark:SpringerVerlag,2005.

共引文献31

同被引文献19

引证文献4

二级引证文献2

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部