On the security of RC4 in TLS

  • Authors:
  • Nadhem J. AlFardan;Daniel J. Bernstein;Kenneth G. Paterson;Bertram Poettering;Jacob C. N. Schuldt

  • Affiliations:
  • Information Security Group, Royal Holloway, University of London;University of Illinois at Chicago and Technische Universiteit Eindhoven;Information Security Group, Royal Holloway, University of London;Information Security Group, Royal Holloway, University of London;Information Security Group, Royal Holloway, University of London

  • Venue:
  • SEC'13 Proceedings of the 22nd USENIX conference on Security
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto protocol standard for secured Internet and mobile applications. TLS supports several symmetric encryption options, including a scheme based on the RC4 stream cipher. In this paper, we present ciphertext-only plaintext recovery attacks against TLS when RC4 is selected for encryption. Our attacks build on recent advances in the statistical analysis of RC4, and on new findings announced in this paper. Our results are supported by an experimental evaluation of the feasibility of the attacks. We also discuss countermeasures.