Attack on broadcast RC4 revisited

  • Authors:
  • Subhamoy Maitra;Goutam Paul;Sourav Sen Gupta

  • Affiliations:
  • Applied Statistics Unit, Indian Statistical Institute, Kolkata, India;Department of Computer Science and Engineering, Jadavpur University, Kolkata, India;Applied Statistics Unit, Indian Statistical Institute, Kolkata, India

  • Venue:
  • FSE'11 Proceedings of the 18th international conference on Fast software encryption
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

In this paper, contrary to the claim of Mantin and Shamir (FSE 2001), we prove that there exist biases in the initial bytes (3 to 255) of the RC4 keystream towards zero. These biases immediately provide distinguishers for RC4. Additionally, the attack on broadcast RC4 to recover the second byte of the plaintext can be extended to recover the bytes 3 to 255 of the plaintext given Ω(N3) many ciphertexts. Further, we also study the non-randomness of index j for the first two rounds of PRGA, and identify a strong bias of j2 towards 4. This in turn provides us with certain state information from the second keystream byte.