A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher

  • Authors:
  • Y. Tsunoo;T. Saito;H. Kubo;T. Suzaki

  • Affiliations:
  • NEC Corp. 1753, Kanagawa;-;-;-

  • Venue:
  • IEEE Transactions on Information Theory
  • Year:
  • 2007

Quantified Score

Hi-index 754.84

Visualization

Abstract

In 2005, Gong proposed an RC4-like stream cipher capable of fast operation on a 32/64-bit processor. This stream cipher solved the RC4 problem of difficult 32/64-bit processing, a problem once thought impossible to solve. Operation of the cipher on 32- and 64-bit processors is about 3.1 and 6.2 times as fast, respectively, as that of the RC4 cipher. However, we have found a considerable bias in the output sequence of the RC4-like stream cipher. Using the bias along with the first two words of a keystream associated with approximately 230 secret keys allows us to build a distinguisher.