A complete characterization of the evolution of RC4 pseudo random generation algorithm

@inproceedings{Basu2008ACC,
  title={A complete characterization of the evolution of RC4 pseudo random generation algorithm},
  author={Riddhipratim Basu and S. Ganguly and S. Maitra and G. Paul},
  booktitle={J. Math. Cryptol.},
  year={2008}
}
  • Riddhipratim Basu, S. Ganguly, +1 author G. Paul
  • Published in J. Math. Cryptol. 2008
  • Computer Science, Mathematics
  • Abstract In this paper, we provide a complete characterization of the RC4 Pseudo Random Generation Algorithm (PRGA) for one step: i = i + 1; j = j + S[i]; swap(S[i], S[j]); z = S[S[i] + S[j]]. This is the first time such an involved description is presented to get a concise view of how RC4 PRGA evolves. Considering all the permutations (we also keep in mind the Finney states), we find that the distribution of z is not uniform given i, j. A corollary of this result shows that information about j… CONTINUE READING
    25 Citations

    Tables and Topics from this paper

    Some observations on HC-128
    • 20
    • PDF
    Proving TLS-attack related open biases of RC4
    • 19
    • PDF
    The Perils of Repeating Patterns: Observation of Some Weak Keys in RC4
    • 1
    • PDF
    Optimization of the Security-Performance Tradeoff in RC4 Encryption Algorithm
    • 9
    NEW ATTACKS ON RC4A AND VMPC
    • 1
    • PDF
    All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS
    • 71
    • PDF
    A new and fast cryptographic hash function based on RC4
    • Qian Yu, C. Zhang
    • Computer Science
    • Cryptologia
    • 2016

    References

    SHOWING 1-9 OF 9 REFERENCES
    Predicting and Distinguishing Attacks on RC4 Keystream Generator
    • 130
    • PDF
    A Practical Attack on the Fixed RC4 in the WEP Mode
    • 64
    • PDF
    New State Recovery Attack on RC4
    • 86
    • PDF
    Finding an internal state of RC4 stream cipher
    • 40
    • PDF
    (Not So) Random Shuffles of RC4
    • Ilya Mironov
    • Computer Science, Mathematics
    • IACR Cryptol. ePrint Arch.
    • 2002
    • 167
    • PDF
    Analysis Methods for (Alleged) RC4
    • 142
    • PDF
    A Practical Attack on Broadcast RC4
    • 321
    • PDF