New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

Size: px
Start display at page:

Download "New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4"

Transcription

1 ew Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata , India, subho@isical.ac.in Goutam Paul Department of Computer Science and Engineering, Jadavpur University, Kolkata , India, goutam paul@cse.jdvu.ac.in Abstract Consider the permutation S in RC4. Roos pointed out in 995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for small values of y, is biased towards some linear combination of the secret key bytes. In this paper, for the first time we show that the bias can be observed in S[S[y]] too. Based on this new form of permutation bias after the KSA and other related results, a complete framework is presented to show that many keystream output bytes of RC4 are significantly biased towards several linear combinations of the secret key bytes. The results do not assume any condition on the secret key. We find new biases in the initial as well as in the 256-th and 257-th keystream output bytes. For the first time biases at such later stages are discovered without any knowledge of the secret key bytes. We also identify that these biases propagate further, once the information for the index j is revealed. Keywords: Bias, Cryptanalysis, Keystream, Key Leakage, RC4, Stream Cipher. This is a revised and extended version of the paper with the same title which has been presented in the 5th Fast Software Encryption (FSE) Workshop, February 0-3, 2008, Lausanne, Switzerland and published in LCS vol. 5086, pages In the current version, Theorem 6 is included as a new result and minor revisions have been made in the formula of Theorem 7.

2 Introduction RC4 is one of the most well known stream ciphers. It has very simple implementation and is used in a number of commercial products till date. Being one of the popular stream ciphers, it has also been subjected to many cryptanalytic attempts for more than a decade. Though lots of weaknesses have already been explored in RC4 [, 2, 3, 4, 5, 6, 7, 8, 0,, 2, 4, 5, 6, 8, 9, 20], it could not be thoroughly cracked yet and proper use of this stream cipher is still believed to be quite secure. This motivates the analysis of RC4. The Key Scheduling Algorithm (KSA) and the Pseudo Random Generation Algorithm (PRGA) of RC4 are presented below. The data structure contains an array S of size (typically, 256), which contains a permutation of the integers {0,..., }, two indices i, j and the secret key array K. Given a secret key k of l bytes (typically 5 to 6), the array K of size is such that K[y] = k[y mod l] for any y, 0 y. Algorithm KSA Initialization: For i = 0,..., S[i] = i; j = 0; Scrambling: For i = 0,..., j = (j + S[i] + K[i]); Swap(S[i], S[j]); Algorithm PRGA Initialization: i = j = 0; Output Keystream Generation Loop: i = i + ; j = j + S[i]; Swap(S[i], S[j]); t = S[i] + S[j]; Output z = S[t]; Apart from some minor details, the KSA and the PRGA are almost the same. In the KSA, the update of the index j depends on the secret key, whereas the key is not used in the PRGA. One may consider the PRGA as the KSA with all zero key. All additions in both the KSA and the PRGA are additions modulo. Initial empirical works based on the weaknesses of the RC4 KSA were explored in [6, 20] and several classes of weak keys had been identified. In [6], experimental evidences of the bias of the initial permutation bytes after the KSA towards the secret key have been reported. It was also observed in [6] that the first keystream output byte of RC4 leaks information about the secret key when the first two secret key bytes add to 0 mod 256. A more general theoretical study has been performed in [, 2] which includes the observations of [6]. These biases do propagate to the keystream output bytes as observed in [5, ]. In [5], the Glimpse theorem [4] is used to show the propagation of biases in the initial keystream output bytes. On the other hand, a bias in the choice of index has been exploited in [] to show a bias in the first keystream output byte. More than a decade ago (995), Roos [6] pointed out that the initial bytes S[y] of the permutation after the KSA are biased towards some function f y (see Section. for the definition of f y ) of the secret key. Since then several works [2, 9, 0,, 2, 3] have considered biases of S[y] either with functions of the secret key bytes or with absolute values and discussed applications of these biases. However, no research has so far been published 2

3 to study how the bytes S[S[y]] are related to the secret key for different values of y. Here we solve this problem, identifying substantial biases in this direction. It is interesting to note that as the KSA proceeds, the probabilities P (S[y] = f y ) decrease monotonically, whereas the probabilities P (S[S[y]] = f y ) first increases monotonically till the middle of the KSA and then decreases monotonically until the end of the KSA. Using these results and other related techniques, we find new biases in the keystream output bytes towards the secret key. A complete framework is presented towards the leakage of information about the secret key in the keystream output bytes, that not only reveals new biases at a later stage (256, 257-th bytes), but also points out that the biases propagate further, once the information regarding j is known. The works [2, 7] also explain how secret key information is leaked in the keystream output bytes. In [2], it is considered that the first few bytes of the secret key is known and based on that the next byte of the secret key is predicted. The attack is based on how secret key information is leaked in the first keystream output byte of the PRGA. In [7], the same idea of [2] has been exploited with the Glimpse theorem [4] to find the information leakage about the secret key at the 257-th byte of the PRGA. ote that, our result is better than that of [7], as in [7] the bias is observed only when certain conditions on the secret key and IV hold. However, the biases we note at 256, 257-th bytes do not assume any such condition on the secret key.. otations, Contributions and Outline Let S r be the permutation, i r and j r be the values of the indices i and j after r many rounds of the RC4 KSA, r. Hence S is the permutation after the complete key scheduling. By S 0, we denote the initial identity permutation. During round r of the KSA, i r = r, r, and hence the permutation S r after round r can also be denoted by S ir+. Let Sr G be the permutation, ig r and jg r be the values of the indices i and j, and z r be the keystream output byte after r many rounds of the PRGA, r. Clearly, i G r = r mod. We also denote S by S0 G as this is the permutation before the PRGA starts. Further, let y(y + ) y f y = + K[x], 2 for y 0. ote that all the additions and subtractions related to the key bytes, the permutation bytes and the indices are modulo. Our contribution can be summarized as follows. In Section 2, we present the results related to biased association of S [S [y]] towards the linear combination f y of the secret key bytes. In Section 3, we present a framework for identifying biases in RC4 keystream bytes towards several linear combinations of the secret key bytes. x=0 3

4 In Section 3.2, we show that P (z = f 0 ) is not a random association. This indicates bias at z 256. In Section 3.3, we use the bias of S [S []] (from Section 2) to prove that P (z + = + f ) is not a random association. This indicates bias at z 257. In Section 3.4, we observe new biases in the initial keystream bytes apart from the known ones [5]. It is shown that for r = and 3 r 32, P (z r = f r ) are not random associations. These results are taken together in Section 3.5 to present cryptanalytic applications. In Section 4, considering that the values of index j are leaked at some points during the PRGA, we show that biases of the keystream output bytes towards the secret key are observed at a much later stage. 2 Bias of S[S[y]] to Secret Key We start this section discussing how P (S r [S r []] = f ) varies with round r, r, during the KSA of RC4. Once again, note that f = (K[0]+K[]+) mod. To motivate, we like to refer to Figure that demonstrates the nature of the curve with an experimentation using 0 million randomly chosen secret keys. The probability P (S r [S r []] = f ) increases till around r = where it gets the maximum value around 0.85 and then it decreases to at r =. ote that this nature is not similar to the nature of P (S r [] = f ) that decreases continuously as r increases during the KSA. Towards the theoretical results, let us first present the base case for r = 2, i.e., after round 2 of the RC4 KSA. Lemma P (S 2 [S 2 []] = K[0] + K[] + ) = 3 4 Further, P (S 2 [S 2 []] = K[0] + K[] + S 2 [] ) 2. Proof: The proof is based on three cases Let K[0] 0, K[] =. The probability of this event is 2. ow S 2 [] = S [K[0] + K[] + ] = S [K[0]] = S 0 [0] = 0. So, S 2 [S 2 []] = S 2 [0] = S [0] = K[0] = K[0] + K[] +. ote that S 2 [0] = S [0], as K[0] + K[] + 0. Moreover, in this case, S 2 []. 2. Let K[0] + K[] = 0, K[0], i.e., K[]. The probability of this event is 2. ow S 2 [] = S [K[0] + K[] + ] = S [] = S 0 [] =. ote that S [] = S 0 [], as K[0]. So, S 2 [S 2 []] = S 2 [] = = K[0] + K[] +. Also, in this case, S 2 []. 4

5 P(S i+ [S i+ []] = (K[0] + K[] + ) mod 256) > i > Figure : P (S i+ [S i+ []] = f ) versus i (r = i + ) during RC4 KSA. 3. S 2 [S 2 []] could be K[0] + K[] + by random association except the two previous cases. Out of that, S 2 [] will happen in 2 Thus P (S 2 [S 2 []] = K[0] + K[] + ) = 2( ) 2 P (S 2 [S 2 []] = K[0] + K[] + S 2 [] ) = 2( ) 2 proportion of cases. + ( 2( ) 2 ) = ( 2( ) 2. Further 3 ) = 2 4( ) 2. 4 Lemma shows that after the second round (i =, r = 2), the event (S 2 [S 2 []] = K[0] + K[] + ) is not a random association. Lemma 2 Let p r = P (S r [S r []] = K[0] + K[] + S r [] r ) for r 2. Then for r 3, p r = ( 2 )p r + ( 2 ) ( )2(r 2). Proof: After the (r )-th round is over, the permutation is S r. In this case, p r = P (S r [S r []] = K[0]+K[]+ S r [] r 2). The event ( (S r [S r []] = K[0]+K[]+ ) (S r [] r ) ) can occur in two mutually exclusive and exhaustive ways: ( (S r [S r []] = K[0] + K[] + ) (S r [] r 2) ) and ( (S r [S r []] = K[0] + K[] + ) (S r [] = r ) ). We compute the contribution of each separately. In the r-th round, i = r and hence does not touch the indices 0,..., r 2. Thus, the event ( (S r [S r []] = K[0] + K[] + ) (S r [] r 2) ) occurs if we already had ( (Sr [S r []] = K[0] + K[] + ) (S r [] r 2) ) and j r / {, r }. Thus, the contribution of this part is p r ( 2 ). 5

6 The event ( (S r [S r []] = K[0] + K[] + ) (S r [] = r ) ) occurs if after the (r )-th round, S r [r ] = r, S r [] = K[0] + K[] + and j r = causing a swap involving the indices and r.. We have S r [r ] = r if the location r is not touched during the rounds i = 0,..., r 2. This happens with a probability at least ( )r. 2. The event S r [] = K[0] + K[] + may happen as follows. In the first round (when i = 0), j / {, K[0] + K[] + } so that S [] = and S [K[0] + K[] + ] = K[0]+K[]+ with probability ( 2 ). After this, in the second round (when i = ), we will have j 2 = j + S [] + K[] = K[0] + K[] +, and so after the swap, S 2 [] = K[0] + K[] +. ow, K[0] + K[] + remains in location from the end of round 2 till the end of round (r ) (when i = r 2) with probability ( )r 3. Thus, P (S r [] = K[0] + K[] + ) = ( 2) ( )r In the r-th round (when i = r ), j r becomes with probability. Thus, P ( (S r [S r []] = K[0]+K[]+) (S r [] = r ) ) = ( ( 2) ( )2(r 2). )r ( 2 ) ( )r 3 = Adding the above two contributions, we get p r = ( 2)p r + ( 2) ( )2(r 2). The recurrence in Lemma 2 along with the base case in Lemma completely specify the probabilities p r for all r [2,...,]. Theorem After the complete KSA, P (S [S []] = K[0] + K[] + ) ( )2( ). Proof: Using the approximation 2 ( )2, the recurrence in Lemma 2 can be rewritten as p r = ap r + a r b, where a = ( )2 and b =. The solution of this recurrence is given by p r = a r 2 p 2 +(r 2)a r b, r 2. Substituting the values of p 2 (from Lemma ), a and b, we get p r = 2 ( )2(r 2) +( r 2 )( )2(r ). Substituting r = and noting the fact that P ( (S [S []] = K[0]+K[]+) (S [] ) ) = P (S [S []] = K[0]+K[]+), we get P (S [S []] = K[0] + K[] + ) = 2 ( )2( 2) + ( 2 )( )2( ). ote that the second term ( for = 256) dominates over the negligibly small first term ( 0.00 for = 256), and so P (S [S []] = K[0] + K[] + ) ( )2( ) (replacing 2 = 2 by in the second term). ow we like to present a more detailed observation. In [6, 2], the association between S [y] and f y is shown. As we have observed the non-random association between S [S []] and f, it is important to study what is the association between S [S [y]] and f y, and moving further, the association between S [S [S [y]]] and f y, for 0 y and so on. Our experimental observations show that these associations are not random (i.e., much more than ) for initial values of y. The experimental observations (over 0 million runs of randomly chosen keys) are presented in Figure 2. The theoretical analysis of the biases of S r [S r [y]] towards f y for small values of y is presented in Appendix A. The results involved in the process are tedious and we need to approximate certain quantities to get the following closed form formula. 6

7 Probability > < A 0. < B 0.05 < C y > Figure 2: A: P (S [y] = f y ), B: P (S [S [y]] = f y ), C: P (S [S [S [y]]] = f y ) versus y (0 y 255). Theorem 2 After the complete KSA, P (S [S [y]] = f y ) y ( ) y(y+) 2 +2( 2) + ( ( ) y(y+) , 0 y 3. ) y(y+) 2 y+2( ) + ( y ) ( y ) Extending similar techniques, the association between S [S... [S [y]]...] and f y can be studied in general. Though the general results are combinatorially interesting, it is not immediate how they will be applicable to find further weaknesses in the RC4 PRGA. In terms of cryptanalytic point of view, we use the non-random association of S [S []] relating f (Theorem ) to obtain the bias at the 257-th keystream output byte in Section Biases in RC4 Keystream We present new biases in Sections 3.2, 3.3 and 3.4, which were not known earlier. For presenting these results, we need to build a framework. That is presented in Section 3.. Some biases in initial keystream bytes of RC4 has earlier been pointed out in [5] that has later been discussed in [8] too. Under our framework, the biases of [5] is presented in Theorem Existing Results under Our Framework Let S G r be the permutation, i G r and jg r be the values of the indices i and j, and z r be the keystream output byte after r many rounds of the PRGA, r. Clearly, i G r = r mod. 7

8 We also denote S by S0 G as this is the permutation before the PRGA starts. Let us consider the existing result that relates each permutation byte after the KSA with certain linear combination of the secret key bytes. Proposition [2, Theorem ] Consider that the index j takes its values uniformly at random during the KSA rounds. Then, P (S r [y] = f y ) ( y ) ( y(y+) 2 +r] +, 0 y r, r. Substituting r = in the statement of the above Proposition, we get the following. Corollary The bias of the final permutation after the KSA towards the secret key is given by P (S [y] = f y ) = ( y ) ( y(y+) 2 +] +, 0 y. As explained in [2], the above result indicates significant biases for small values of y (more precisely, for 0 y 47), that is supported by the experimental result presented in [6]. The Glimpse Main Theorem [4, 7] states that after the r-th round of the PRGA, r, P (Sr G[jG r ] = r z r) = P (Sr G[iG r ] = jg r z r) = 2. We rewrite the first relation between Sr G[jG r ] and r z r as the following proposition. Proposition 2 P (z r = r S G r [ig r ]) = 2, r. Proof: Sr G [jr G ] is assigned the value of Sr [i G G r ]. As the Glimpse Main Theorem gives P (z r = r Sr G[jG r ]) = 2 for r, we get P (z r = r Sr G [ig r ]) = 2 for r. The idea of writing the Glimpse Main Theorem in the form of Proposition 2 is due to the fact that relating z r to Sr [i G G r ] will ultimately relate z r to the secret key bytes, as the permutations in the initial rounds of the PRGA are related to the secret key. The following lemma shows how the permutation bytes at rounds t and r of the PRGA, for t + 2 r, are related. Lemma 3 Let P (St G[iG r ] = X) = q t,r, for some X. Then, for t + 2 r t +, P (Sr G [ig r ] = X) = q [( ] t,r )r t +. Proof: We consider two separate cases.. St G[iG r ] = X and during the next (r t ) rounds of the PRGA, the index ig r is not touched by any of the r t many j values (since t + 2 r t +, the index i G r is not touched by any of the r t many i values anyway). The first event occurs with probability q t,r and the second event occurs with probability ( )r t. Thus the contribution of this case is q t,r ( )r t. 2. St G[iG r ] X and still SG r [ig r ] equals X by random association. The contribution of this case is ( q t,r ). Thus, adding the above two contributions, we get P (Sr G [ig r ] = X) = q t,r ( ( q t,r ) = q [( ] t,r )r t +. 8 )r t +

9 Remark The above result holds for t + 2 r t +, and not for r = t +. If we take r = t+, then S G r = SG t, which is our starting point, i.e., P (SG r [ig r ] = X) = P (SG t [ig r ] = X) = q t,r. The following is an immediate consequence of Lemma 3. Corollary 2 For 2 r, P (Sr G [r] = f r) = [ [ ] ( r ( )r +. ) ( r(r+) 2 +] + ] Proof: For 2 r, we have i G r = r. Taking X = f r and t = 0 in Lemma 3, we have q 0,r = P (S0 G [r] = f r ) = P (S [r] = f r ) = ( r) ( r(r+) 2 +] + (by Corollary ), and hence P (Sr G [r] = f r) = [ ( r) ( r(r+) 2 +] + ] [ ] ( )r +. ext, we present the bias of each keystream output byte to a combination of the secret key bytes in the following lemma. Lemma 4 Let P (S G r [ig r ] = f i G r ) = w r, for r. Then P (z r = r f i G r ) = ( + w r), r. Proof: We consider two separate cases in which the event (z r = r f i G r ) can occur.. Sr G [ig r ] = f i and z G r r = r Sr G [ig r ]. The contribution of this case is P (SG r [ig r ] = f i G r ) P (z r = r Sr [i G G r ]) = w r 2 (by Proposition 2). 2. Sr G [ig r ] f i, and still z G r r = r f i G r due to random association. So the contribution of this case is P (Sr [i G G r ] f i G r ) = ( w r). Adding the above two contributions, we get the total probability as w r 2 + ( w r) = ( + w r). The following biases were discovered in [5]. Theorem 3 ( () P (z = f ) = (2) For 2 r (, P (z r = r f r ) = + ( ) [ ( r ) ( r(r+) ). 2 +] + ] [ ( )r ] ) +. Proof: First, we prove part (). In the first round, i.e., when r =, we have i G r = and f i G r = f, and so w = P (S0 G [] = f ) = P (S [] = f ) = ( ) ( (+) 2 +] + = ( ( )+2 + (by Corollary ). ow, using Lemma 4, we get P (z ) = f ) = (+w ) = + ( )+2 +. ext, we prove part (2). From Corollary 2, w r = P (Sr G [r] = f r) = [ ( r) ( r(r+) 2 +] + ] [ ] ( )r + (, 2 r. ow, using Lemma 4, we get P (z r = r f r ) = (+w r) = + [ ( r ) ( r(r+) 2 +] + ] [ ] ) ( )r +. 9

10 ote that Lemma 3 or Corollary 2 is not used in proving part () of the above theorem. It is proved directly from Corollary. In fact, Lemma 3 can not be used in part (), as here we have r = t + with t = 0 (see Remark ). To have a clear understanding of the quantity of the biases, Table lists the numerical values of the probabilities according to the formula given in Theorem 3. ote that the random association is, which is for = 256. Close to the round 48, the biases tend to disappear. This is indicated by the convergence of the values to the probability = r P (z r = r f r ) Table : The probabilities computed following Theorem 3. One may check that P (z = f ) = ( ) and that decreases to P (z 32 = 32 f 32 ) = ( ), but still then it is 5% more than the random association. 3.2 ew Bias in the 256-th Keystream Output Byte Interestingly, the biases again reappear after rounds 256 and 257. First we present the bias for the 256-th keystream byte. ( ) Theorem 4 P (z = f 0 ) = + ( )2 + ( 2 ) +. 2 Proof: During the -th round of the PRGA, i G = mod = 0. Taking X = f 0, t = 0 and r = in Lemma 3, we have q 0, = P (S0 G[0] = f 0) = P (S [0] = f 0 ) = ( ) + (by Corollary ), and hence w = P (S G [0] = f 0) = [ ] [ ] ( ) + ( ) + = ( )2 + ( 2 ) ( +. Thus, by Lemma 4, the bias is given by 2 ) P (z = f 0 ) = ( + w ) = + ( )2 + ( 2 ) +. 2 For = 256, w = w 256 = and the bias turns out to be (i.e., ( )). Experimental results confirm this bias. 3.3 ew Bias in the 257-th Keystream Output Byte We will now show that the bias in the 257-th keystream output byte follows from Theorem, i.e., P (S [S []] = K[0] + K[] + ) ( )2( ). 0

11 Theorem( 5 P (z + = + f ) = + ( ( ( )3( ) ( )2( ) + Proof: During the ( +)-th round, we have, i G + = ( +) mod =. Taking X = f, t = and r = + in Lemma 3, we have q,+ = P (S G[] = f ) = P (S [S []] = f ) = )2( ), and hence w + = P (S G[] = f [( ] ) = ( )2( ) ) + = )3( ) ( ( )2( ) +. ow, using Lemma 4, we get P (z ) + = + f ) = ( + w +) = + ( )3( ) ( )2( ) +. For = 256, w + = w 257 = and P (z 257 = 257 f ) = ( ) = which also conforms to experimental observation. 3.4 More ew Biases in Initial Bytes of RC4 Keystream The biases of z r with r f r for the initial keystream output bytes have been pointed out in Theorem 3. Interestingly, experimental observation reveals bias of z r with f r too. The results are presented in Table 2 which is experimented over hundred million (0 8 ) randomly chosen keys of 6 bytes. For proper random association, P (z r = f r ) should have been 256, i.e., r P (z r = f r ) ). Table 2: Additional bias of the keystream bytes towards the secret key. Following our experimental observation, the explanation of the fact P (z 3 = f 2 ) > 256 was pointed out in [7]. We present the idea of [7] in this paragraph. Assume that after the third round of the KSA, S 3 [2] takes the value f 2, and is hit by j later in the KSA. Then f 2 is swapped with S k [k] and consider that S k [k] has remained k so far. Further, suppose that S [3] = 0 holds. Thus, S [2] = k, S [k] = f 2 and S [3] = 0 at the end of the KSA. In the second round of the PRGA, S G [2] = k is swapped with a more or less random location S G[l]. Therefore, SG 2 [l] = k and jg 2 = l. In the next round, i = 3 and points to S2 G[3] = 0. So j does not change and hence jg 3 = l = jg 2. Thus, SG 2 [l] = k is swapped with S2 G [3] = 0, and one gets S3 G [l] = 0 and S3 G [3] = k. The output z 3 is now S3 G[SG 3 [i] + SG 3 [jg 3 ]] = SG 3 [k + 0] = SG 3 [k] = f 2. Along the same line of arguments given in [7], we here provide a detailed theoretical analysis of the event z r = f r in general and explicitly derive a formula for P (z r = f r ).

12 The proof depends on P (S [r] = 0) for different r values. The explicit formula for the probabilities P (S [u] = v) was derived for the first time in [9] and the problem was addressed again in [0, 3]. Proposition 3 [3, Theorem, Item 2] For 0 v, v u, P (S [u] = v) = ( ) u + ( )v+ ( )+v u. Theorem 6 P (z = f 0 ) = ( ( ) ( ). )2 ( 2 ) γ +, where γ = ( ) 2 + Proof: Substituting r =, y = 0 in Proposition, we have P (S [0] = f 0 ) =. After the first round, suppose that the index 0 is touched for the first time by j t+ in round t + of the KSA and due to the swap the value f 0 is moved to the index t, t and also prior to this swap the value at the index t was t itself, which now comes to the index 0. This means that from round to round t (both inclusive), the pseudo-random index j has not taken the values 0 and t. So, after round t +, P ( (S t+ [0] = t) (S t+ [t] = f 0 ) ) = P ( (S t [0] = f 0 ) (S t [t] = t) (j t+ = 0) ) = ( 2 )t. From the end of round t + to the end of the KSA, f 0 remains in index t and t remains in index 0 with probability ( 2 ) t. Thus, P ( (S [0] = t) (S [t] = f 0 ) ) = ( 2 )t ( 2 ) t = ( 2 ) = β (say). In the first round of the PRGA, j G = 0 + SG 0 [] = S []. From Proposition 3, we have P (S [] = 0) = γ, where γ = ( ) 2 + ( ) ( ). If S [] = 0, then j G = 0 and z [ = S G S G [] + S G[jG ]] [ = S G S G 0 [] + S0 G[jG ]] = S G[0 + t] = SG [t]. Since t 0, the swap of the values at the indices 0 and does not move the value at the index t. Thereby S G [t] = S0 G [t] = S [t] = f 0 and z = f 0 with probability β γ = δ (say). Since, t can values, 2, 3,...,, the total probability is δ ( ). Substituting the values of β, γ, δ, we get the probability that the event (z = f 0 ) occurs in the above path is p = ( ) ( 2 ) γ. If the above path is not followed, still there is ( p) probability of occurrence of the event due to random association. Adding these two probabilities, we get the result. ( Theorem 7 For 3 r, P (z r = f r ) = ( ) ( r) ( r+) ( r(r ) 2 +r] ) + ( 2 ) r ( 3 )r 2 γ r +, where γ r = ( ) r + ( ) ( ) r. Proof: Substituting y = r in Proposition, we have P (S r [r ] = f r ) = α r, where α r ( r+) ( r(r ) 2 +r] +, r. After round r, suppose that the index r is touched for the first time by j t+ in round t + of the KSA and due to the swap the value f r is moved to the index t, r t and also prior to this swap the value at 2

13 the index t was t itself, which now comes to the index r. This means that from round r + to round t (both inclusive), the pseudo-random index j has not taken the values r and t. So, after round t +, P ( (S t+ [r ] = t) (S t+ [t] = f r ) ) = P ( (S t [r ] = f r ) (S t [t] = t) (j t+ = r ) ) = α r ( 2 )t r. From the end of round t+ until the end of the KSA, f r remains in index t and t remains in index r with probability ( 2 ) t. Thus, P ( (S [r ] = t) (S [t] = f r ) ) = α r ( 2 )t r ( 2 ) t = α r ( 2 ) r = β r (say). Also, from Proposition 3, we have P (S [r] = 0) = γ r, where γ r = ( ) r + ( ) ( ) r. Suppose the indices r, t and r are not touched by the pseudo-random index j in the first r 2 rounds of the PRGA. This happens with probability ( 3 )r 2. In round r of the PRGA, due to the swap, the value t at index r moves to the index jr G with probability, and jr G 2 / {t, r} with probability ( ). Further, if [ SG r [r] remains 0, then in round r of the PRGA, jr G = jr G and z r = Sr G S G r [r] + Sr G [jr G ] ] [ = Sr G S G r [r] + Sr [j G r ] ] G = Sr G[0 + t] = SG r [t] = f r with probability β r γ r ( 3 )r 2 ( 2) = δ r (say). Since, t can values r, r +, r + 2,...,, the total probability is δ r ( r). Substituting the values of α r, β r, γ r, δ r (, we get the probability that the ) event (z r = f r ) occurs in the above path is p = ( r) ( r+) ( r(r ) 2 +r] + ( 2 ) r ( 3 )r 2 γ r. If the above path is not followed, still there is ( p) probability of occurrence of the event due to random association. Adding these two probabilities, we get the result. The theoretically computed values of the probabilities according to the above two theorems match with the experimental values provided in Table 2. Theorem 7 does not cover cases r = and r = 2. Case r = was already separately presented in Theorem 6. It is interesting to justify the absence of bias in case r = 2 as observed experimentally in Table Cryptanalytic Applications Here we accumulate the results explained above. Consider the first keystream output byte z of the PRGA. We find the results that P (z = f ) = (see Theorem 3 and Table ) and that P (z = f 0 ) = (see Theorem 6 and Table 2). Further, from [], we have the result that P (z = f 2 ) = Taking them together, one can check that the P (z = f 0 z = f z = f 2 ) = ( ) ( ) ( ) = (The independence assumption in calculating the probability is supported by detailed experimentation with 00 different runs, each run presenting the average probability considering 0 million randomly chosen secret keys of 6 bytes.) Our result indicates that out of randomly chosen 0000 secret keys, in 48 cases on an average, z reveals f 0 or f or f 2, i.e., K[0] or (K[0]+K[]+) or (K[0]+K[]+K[2]+3). If, however, one tries a random association, considering that z will be among three randomly chosen values v, v 2, v 3 from [0,..., 255], then P (z = v z = v 2 z = v 3 ) = ( 256 )3 = 3

14 0.07. Thus one can guess z with an additional advantage of % = 27% 0.07 over the random guess. Looking at z 2, we have P (z 2 = 2 f 2 ) = (see Theorem 3 and Table ), which provides an advantage of % = 36% Similarly, referring to Theorem 3 and Theorem 7 (and also Table and Table 2), significant biases can be observed in P (z r = f r z r = r f r ) for r = 3 to 32 over random association. ow consider the following scenario with the events E,..., E 32, where E : (z = f 0 z = f z = f 2 ), E 2 : (z 2 = 2 f 2 ), and E r : (z r = f r z r = r f r ) for 3 r 32. Observing the first 32 keystream output bytes z,..., z 32, one may try to guess the secret key assuming that 3 or more of the events E,..., E 32 occur. We experimented with 0 million randomly chosen secret keys of length 6 bytes. We found that 3 or more of the events occur in proportion of cases, which is true for proportion of cases for random association. This demonstrates a substantial advantage (40%) over random guess. 4 Further Biases when j is Known during PRGA In all the currently known biases as well as in all the new biases discussed in this paper so far, it is assumed that the value of the pseudo-random index j is unknown. In this section, we are going to show that the biases in the permutation at some stage of the PRGA propagates to the keystream output bytes at a later stage, if the value of the index j at the earlier stage is known. Suppose that we know the value jt G of j after the round t in the PRGA. With high probability, the value V at the index jt G will remain there until jt G is touched by the deterministic index i for the first time after a few more rounds depending on what was the position (t mod ) of i at the t-th stage. This immediately leaks V in keystream output byte. More importantly, if the value V is biased to the secret key bytes, then that information will be leaked too. Formally, let P (St G[jG t ] = V ) = η t for some V. ote that, jt G will be touched by i in round r, where r = t + (jt G t mod ) or t + ( t mod ) + jt G depending on whether jt G > t mod or jt G t mod respectively. By Lemma 3, we would have [( P (Sr G [jg t ] = V ) = η t ( P (z r = r V ) = + η t )r t ] + [( )r t. ow, Lemma 4 immediately gives ] ) +. For some special V s, the form of η t may be known. In that case, it will be advantageous to probe the values of j at particular rounds. For example, according to Corollary 2, after the (t )-th round of the PRGA, St G [t] is biased to the linear combination f t of the t(t+) ] +. secret key bytes with probability η t = [ ( t ) ( 2 +] + ] [ ( )t ow, at round t, f t would move to the index j t due to the swap, and hence St G[j t] will be biased to f t with the same probability. So, the knowledge of j t will leak information about f t in round r = t + (jt G t mod ) or t + ( t mod ) + jt G depending on whether 4

15 j G t > t mod or j G t t mod respectively. If we know the values of j at multiple stages of the PRGA (it may be possible to read some values of j through side-channel attacks), then the biases propagate further down the keystream output bytes. The following example illustrates how the biases propagate down the keystream output bytes when single as well as multiple j G values are known. Example Suppose we know the value of j5 G as 8. With probability η 5, S4 G [5] would have remained f 5 which would [( move to index 8 ] due to the swap in round 5, i.e., S5 G [8] = f 5. With approximately η 5 )8 5 + probability, f 5 would remain in index 8 till the end of the round 8- = 7. So, we immediately get a bias of z 8 with 8 f 5. Moreover, in round 8, f 5 would move from index 8 to j8 G. So, if the value of jg 8 is also known, say j8 G = 3, then we have SG 8 [3] = f 5. We can apply the same line of arguments for round = 259 to get a bias of z 259 with 259 f 5. Experiments with billion random keys demonstrate that in this case the bias of z 8 towards 8 f 5 is and the bias of z 259 towards 259 f 5 is These conform to the theoretical values and show that the knowledge of j during the PRGA helps in finding non-random association (away from = ) between the keystream output bytes and 256 the secret key. 5 Conclusion In this paper, we present several new observations on weaknesses of RC4. It is shown that biases towards the secret key exists at the permutation bytes S[S[y]] for different y values. To our knowledge, this is the first attempt to formally analyze the biases of S[S[y]] and its implications towards the security of RC4. Moreover, a framework is built to analyze biases of the keystream output bytes towards different linear combinations of the secret key bytes. Subsequently, theoretical results are proved to show that RC4 keystream output bytes at the indices to 32 leak significant information about the secret key bytes. We also discovered and proved new biases towards the secret key at the 256-th and the 257-th keystream output bytes. Moreover, we show that if one knows the value of j during some rounds of the PRGA, then the biases propagate further down the keystream. Acknowledgment: The authors like to thank Mr. Snehasis Mukherjee, Indian Statistical Institute, Kolkata for his support in the preparation of the graphs. References [] S. R. Fluhrer and D. A. McGrew. Statistical Analysis of the Alleged RC4 Keystream Generator. FSE 2000, pages 9-30, vol. 978, Lecture otes in Computer Science, Springer. [2] S. R. Fluhrer, I. Mantin and A. Shamir. Weaknesses in the Key Scheduling Algorithm of RC4. SAC 200, pages -24, vol. 2259, Lecture otes in Computer Science, Springer. 5

16 [3] J. Golic. Linear statistical weakness of alleged RC4 keystream generator. EURO- CRYPT 997, pages , vol. 233, Lecture otes in Computer Science, Springer. [4] R. J. Jenkins. ISAAC and RC Available at [5] A. Klein. Attacks on the RC4 stream cipher. February 27, Available at klein/rc4/, [last accessed on June 27, 2007]. [6] I. Mantin and A. Shamir. A Practical Attack on Broadcast RC4. FSE 200, pages 52-64, vol. 2355, Lecture otes in Computer Science, Springer. [7] I. Mantin. A Practical Attack on the Fixed RC4 in the WEP Mode. ASIACRYPT 2005, pages 395-4, vol. 3788, Lecture otes in Computer Science, Springer. [8] I. Mantin. Predicting and Distinguishing Attacks on RC4 Keystream Generator. EU- ROCRYPT 2005, pages , vol. 3494, Lecture otes in Computer Science, Springer. [9] I. Mantin. Analysis of the stream cipher RC4. Master s Thesis, The Weizmann Institute of Science, Israel, 200. [0] I. Mironov. (ot So) Random Shuffles of RC4. CRYPTO 2002, pages , vol. 2442, Lecture otes in Computer Science, Springer. [] G. Paul, S. Rathi and S. Maitra. On on-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. Proceedings of the International Workshop on Coding and Cryptography 2007, pages [2] G. Paul and S. Maitra. Permutation after RC4 Key Scheduling Reveals the Secret Key. SAC 2007, pages , volume 4876, Lecture otes in Computer Science, Springer. A revised and extended version with the title RC4 State Information at Any Stage Reveals the Secret Key is available at the IACR Eprint Server, eprint.iacr.org, number 2007/208, June, [3] G. Paul, S. Maitra and R. Srivastava. On on-randomness of the Permutation after RC4 Key Scheduling. Proceedings of the Applied Algebra, Algebraic Algorithms, and Error Correcting Codes (AAECC-7), pages 00-09, volume 485, Lecture otes in Computer Science, Springer. [4] S. Paul and B. Preneel. Analysis of on-fortuitous Predictive States of the RC4 Keystream Generator. IDOCRYPT 2003, pages 52-67, vol. 2904, Lecture otes in Computer Science, Springer. [5] S. Paul and B. Preneel. A ew Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. FSE 2004, pages , vol. 307, Lecture otes in Computer Science, Springer. 6

17 [6] A. Roos. A class of weak keys in the RC4 stream cipher. Two posts in sci.crypt, message-id 43ueh$j3@hermes.is.co.za and 44ebge$llf@hermes.is.co.za, 995. Available at [7] E. Tews. Communications, September, [8] E. Tews, R. P. Weinmann and A. Pyshkin. Breaking 04 bit WEP in less than 60 seconds. IACR Eprint Server, eprint.iacr.org, number 2007/20, April, [9] S. Vaudenay and M. Vuagnoux. Passive-only key recovery attacks on RC4. SAC 2007, pages , volume 4876, Lecture otes in Computer Science, Springer. [20] D. Wagner. My RC4 weak keys. Post in sci.crypt, message-id 447ol$cbj@cnn.Princeton.EDU, 26 September, 995. Available at daw/my-posts/my-rc4-weak-keys. Appendix A Lemma 5 P ( (S y+ [S y+ [y]] = f y ) (S y+ [y] y) ) ( ( ) ) ( y(y+) 2 y( 2 )y + ( )y), 0 y 3. Proof: S y+ [y] y means that it can take y+ many values 0,,..., y. Suppose S y+ [y] = x, 0 x y. Then S y+ [x] can equal f y in the following way.. From round (when i = 0) to x (when i = x ), j does not touch the indices x and f y. Thus, after round x, S x [x] = x and S x [f y ] = f y. This happens with probability ( 2 )x. 2. In round x + (when i = x), j x+ becomes equal to f y, and after the swap, S x+ [x] = f y and S x+ [f y ] = x. The probability of this event is P (j x+ = f y ) =. 3. From round x + 2 (when i = x + ) to y (when i = y ), again j does not touch the indices x and f y. Thus, after round y, S y [x] = f y and S y [f y ] = x. This occurs with probability ( 2 )y x. 4. In round y + (when i = y), j y+ becomes equal to f y, and after the swap, S y+ [y] = S y [f y ] = x and S y+ [S y+ [y]] = S y+ [x] = S y [x] = f y. According to [2, Lemma ], this happens with probability ( 2 +. For small values of y, this is approximately equal to ( ) y(y+) 2, which gives a simpler expression. We consider 0 y 3 for good approximation. )+ y(y+) Considering the above events to be independent, we have P ( (S y+ [S y+ [y]] = f y ) (S y+ [y] = x) ) = ( 2 )x 2 ( )y x ( 2 ) ( )y ( [0,..., y ], we get P ( (S y+ [S y+ [y]] = f y ) (S y+ [y] y ) ) = ( y ) y(y+) 2 = ( 7 ) y(y+) 2. Summing for all x in ) ( 2 )y ( ) y(y+) 2.

18 If S y+ [y] = y, then S y+ [S y+ [y]] can equal f y in the following ways: (a) f y has to be equal to y; this happens with probability, (b) index y is not touched by j in any of the first y rounds; this happens with probability ( )y, and (c) in the (y + )-th round, j y+ = f y so that there is no swap; this happens approximately with probability ( ) y(y+) 2 (as explained in Item 4 above). Hence, P ( (S y+ [S y+ [y]] = f y ) (S y+ [y] = y) ) = ( ) ( )y ( ) y(y+) 2. Adding the above two contributions (one for 0 S y+ [y] y and the other for S y+ [y] = y), we get P ( (S y+ [S y+ [y]] = f y ) (S y+ [y] y) ) = ( ( ( y( 2 )y + ( )y). ) y(y+) 2 Lemma 6 Let p r (y) = P ( (S r [S r [y]] = f y ) (S r [y] r ) ), 0 y, r. Then p r (y) = ( 2 )p r (y) + ( y ) ( ) y(y+) 2 +2r 3, 0 y 3, y + 2 r. Proof: Then event ( (S r [S r [y]] = f y ) (S r [y] r ) ) (, where r y + 2, can occur in two mutually exclusive and exhaustive ways: (Sr [S r [y]] = f y ) (S r [y] r 2) ) ( and (Sr [S r [y]] = f y ) (S r [y] = r ) ). We compute the contribution of each separately. In the r-th round, i = r / {0,..., r 2}. Hence the event ( (S r [S r [y]] = f y ) (S r [y] r 2) ) occurs if we already had ( (S r [S r [y]] = f y ) (S r [y] r 2) ) and j r / {y, S r [y]}. Thus, the contribution of this part is p r (y) ( 2 ). The event ( (S r [S r [y]] = f y ) (S r [y] = r ) ) occurs if after the (r )-th round, S r [r ] = r, S r [y] = f y and in the r-th round (i.e., when i = r ), j r = y causing a swap involving the indices y and r.. We have S r [r ] = r if the location r is not touched during the rounds i = 0,..., r 2. This happens with probability ( )r. 2. The event S r [y] = f y, according to Proposition, happens with a probability ( y ( y ) ( ) ( y(y+) 2 +r ] + y(y+). For small values of y, this is approximately equal to 2 +r 2] which gives a simpler expression. We consider 0 y 3 for good approximation. 3. In the r-th round (when i = r ), j r becomes y with probability. Thus, P ( (S r [S r [y]] = f y ) (S r [y] = r ) ) = ( )r ( y )( y(y+) 2 ) +r 2] = ( y ) ( ) y(y+) 2 +2r 3. Adding the above two contributions, we get p r (y) = ( 2)p r (y) + ( y ) ( ) y(y+) 2 +2r 3. The recurrence in Lemma 6 and the base case in Lemma 5 completely specify the probabilities p r (y) for all y in [0,..., 3] and r in [y +,..., ]. Theorem 2 (Section 2): After the complete KSA, P (S [S [y]] = f y ) y ( ) y(y+) 2 +2( 2) + ( 8 ) y(y+) 2 y+2( ) + ( y ) ( y )

19 ( ) y(y+) , 0 y 3. Proof: Using the approximation 2 )2, the recurrence in Lemma 6 can be rewritten as p r (y) = ( where a = ( )2 p r (y) + ( y )2 and b = ( y ( ) ( ) y(y+) ) y(y+) 2 +2r 3, i.e., p r (y) = ap r (y) + a r b, ) ( 2. The solution of this recurrence is p r (y) = a r y p y+ (y) + (r y )a r b, r y +. Substituting the values of p y+ (y) (from Lemma 5), a and b, we get p r (y) = y ( ) y(y+) 2 +2(r 2) + ( ) y(y+) 2 y+2(r ) + ) ( y ) ( ) y(y+) ( r y 2 +2r 3, y + r, for initial values of y (0 y 3). Substituting r = and noting the fact that P ( (S [S [y]] = f y ) (S [y] ) ) = P (S [S [y]] = f y ), we get the result. 9

Proof of Empirical RC4 Biases and New Key Correlations

Proof of Empirical RC4 Biases and New Key Correlations Proof of Empirical RC4 Biases and ew Key Correlations Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul 2, and Santanu Sarkar Applied Statistics Unit, Indian Statistical Institute, Kolkata 700 08, India 2

More information

RC4 State Information at Any Stage Reveals the Secret Key

RC4 State Information at Any Stage Reveals the Secret Key RC4 State Information at Any Stage Reveals the Secret Key Goutam Paul Department of Computer Science and Engineering, Jadavpur University, Kolkata 700 032, India, Email: goutam paul@cse.jdvu.ac.in Subhamoy

More information

Attack on Broadcast RC4

Attack on Broadcast RC4 Attack on Broadcast RC4 Revisited S. Maitra 1 G. Paul 2 S. Sen Gupta 1 1 Indian Statistical Institute, Kolkata 2 Jadavpur University, Kolkata FSE 2011, Lyngby, Denmark 15 February 2011 Outline of the Talk

More information

(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 stream cipher

(Non-)Random Sequences from (Non-)Random Permutations - Analysis of RC4 stream cipher (on-)random Sequences from (on-)random Permutations - Analysis of RC4 stream cipher Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul 2, and Santanu Sarkar Applied Statistics Unit, Indian Statistical Institute,

More information

Attack on Broadcast RC4 Revisited

Attack on Broadcast RC4 Revisited Attack on Broadcast RC4 Revisited Subhamoy Maitra, Goutam Paul 2, and Sourav Sen Gupta Applied Statistics Unit, Indian Statistical Institute, Kolkata 700 08, India {subho,souravsg r}@isical.ac.in 2 Department

More information

Revisiting Roos Bias in RC4 Key Scheduling Algorithm

Revisiting Roos Bias in RC4 Key Scheduling Algorithm Revisiting Roos Bias in RC4 Key Scheduling Algorithm Santanu Sarkar, Ayineedi Venkateswarlu To cite this version: Santanu Sarkar, Ayineedi Venkateswarlu. Revisiting Roos Bias in RC4 Key Scheduling Algorithm.

More information

(Non-)Random Sequences from (Non-)Random Permutations Analysis of RC4 Stream Cipher

(Non-)Random Sequences from (Non-)Random Permutations Analysis of RC4 Stream Cipher J. Cryptol. (2014) 27: 67 108 DOI: 10.1007/s00145-012-9138-1 (on-)random Sequences from (on-)random Permutations Analysis of RC4 Stream Cipher Sourav Sen Gupta and Subhamoy Maitra Applied Statistics Unit,

More information

Some New Weaknesses in the RC4 Stream Cipher

Some New Weaknesses in the RC4 Stream Cipher Some ew Weaknesses in the RC4 Stream Cipher Jing Lv (B), Bin Zhang, and Dongdai Lin 2 Laboratory of Trusted Computing and Information Assurance, Institute of Software, Chinese Academy of Sciences, 0090

More information

On the Weak State in GGHN-like Ciphers

On the Weak State in GGHN-like Ciphers 2012 Seventh International Conference on Availability, Reliability and Security On the Weak State in GGH-like Ciphers Aleksandar Kircanski Dept. of Computer Science and Software Engineering Concordia University

More information

Predicting and Distinguishing Attacks on RC4 Keystream Generator

Predicting and Distinguishing Attacks on RC4 Keystream Generator Predicting and Distinguishing Attacks on RC4 Keystream Generator Itsik Mantin NDS Technologies, Israel imantin@nds.com Abstract. In this paper we analyze the statistical distribution of the keystream generator

More information

Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA

Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA Sourav Sen Gupta 1 Subhamoy Maitra 1 Willi Meier 2 Goutam Paul 1 Santanu Sarkar 3 Indian Statistical Institute, India FHNW, Windisch,

More information

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy

Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium wu.hongjun,bart.preneel@esat.kuleuven.be

More information

Key reconstruction from the inner state of RC4

Key reconstruction from the inner state of RC4 BACHELOR THESIS Lukáš Sladký Key reconstruction from the inner state of RC4 Department of Algebra Supervisor of the bachelor thesis: Study programme: Study branch: Mgr. Milan Boháček Mathematics Mathematical

More information

Cryptanalysis of the Full Spritz Stream Cipher

Cryptanalysis of the Full Spritz Stream Cipher Cryptanalysis of the Full Spritz Stream Cipher Subhadeep Banik 1,2 and Takanori Isobe 3 1 School of Physical and Mathematical Sciences, NTU 2 DTU Compute, Technical University of Denmark, Lungby 3 Sony

More information

Expanding Weak-key Space of RC4

Expanding Weak-key Space of RC4 [DOI: 10.2197/ipsjjip.22.357] Recommended Paper Expanding Weak-key Space of RC4 Atsushi agao 1,a) Toshihiro Ohigashi 2 Takanori Isobe 1 Masakatu Morii 1 Received: July 7, 2013, Accepted: ovember 1, 2013

More information

How to Find Short RC4 Colliding Key.

How to Find Short RC4 Colliding Key. JAIST Reposi https://dspace.j Title How to Find Short RC4 Colliding Key Author(s)Chen, Jiageng; Miyaji, Atsuko Citation Lecture Notes in Computer Science, 7 46 Issue Date 2011-10-12 Type Journal Article

More information

VMPC One-Way Function and Stream Cipher

VMPC One-Way Function and Stream Cipher VMPC One-Way Function and Stream Cipher Bartosz Zoltak http://www.vmpcfunction.com bzoltak@vmpcfunction.com This paper was presented at FSE 04, Delhi, India, 5-7.FEB.2004 Copyright by IACR Abstract. A

More information

On the pseudo-random generator ISAAC

On the pseudo-random generator ISAAC On the pseudo-random generator ISAAC Jean-Philippe Aumasson FHNW, 5210 Windisch, Switzerland Abstract. This paper presents some properties of he deterministic random bit generator ISAAC (FSE 96), contradicting

More information

Klein s and PTW Attacks on WEP

Klein s and PTW Attacks on WEP TTM4137 Wireless Security Klein s and PTW Attacks on WEP Anton Stolbunov NTNU, Department of Telematics version 1, September 7, 2009 Abstract These notes should help for an in-depth understanding of the

More information

Recent Cryptanalysis of RC4 Stream Cipher

Recent Cryptanalysis of RC4 Stream Cipher 28 August, 2013 ASK 2013 @ Weihai, China Recent Cryptanalysis of RC4 Stream Cipher Takanori Isobe Kobe University Joint work with Toshihiro Ohigashi, Yuhei Watanabe, and Maskatu Morii Agenda This talk

More information

Improved Distinguishing Attacks on HC-256

Improved Distinguishing Attacks on HC-256 Improved Distinguishing Attacks on HC-256 Gautham Sekar 1,2, and Bart Preneel 1,2 1 Department of Electrical Engineering ESAT/SCD-COSIC, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, B-3001

More information

Statistical Attack on RC4

Statistical Attack on RC4 Statistical Attack on RC4 Distinguishing WPA Pouyan Sepehrdad, Serge Vaudenay, and Martin Vuagnoux EPFL CH-1015 Lausanne, Switzerland http://lasecwww.epfl.ch Abstract. In this paper we construct several

More information

A Combinatorial Analysis of HC-128

A Combinatorial Analysis of HC-128 A Combinatorial Analysis of HC-128 Goutam Paul 1, Subhamoy Maitra 2, Shashwat Raizada 2 1 Department of Computer Science and Engineering, Jadavpur University, Kolkata 700 032, India. goutam.paul@ieee.org

More information

Attacks on the RC4 stream cipher

Attacks on the RC4 stream cipher Attacks on the RC4 stream cipher Andreas Klein July 4, 2007 Abstract In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack

More information

On a new properties of random number sequences,a randomness test and a new RC4 s key scheduling algorithm.

On a new properties of random number sequences,a randomness test and a new RC4 s key scheduling algorithm. On a new properties of random number sequences,a randomness test and a new RC4 s key scheduling algorithm. Samir Bouftass 1 and Abdelhak Azhari 2 1 Crypticator.Inc, e-mail : crypticator@gmail.com. 2 University

More information

Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers

Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers Impact of Extending Side Channel Attack on Cipher Variants: A Case Study with the HC Series of Stream Ciphers Goutam Paul and Shashwat Raizada Jadavpur University, Kolkata and Indian Statistical Institute,

More information

Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher

Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher Message Authentication (MAC) Algorithm For The VMPC-R (RC4-like) Stream Cipher Bartosz Zoltak www.vmpcfunction.com bzoltak@vmpcfunction.com Abstract. We propose an authenticated encryption scheme for the

More information

A TMDTO Attack Against Lizard

A TMDTO Attack Against Lizard A TMDTO Attack Against Lizard Subhamoy Maitra 1, Nishant Sinha 2, Akhilesh Siddhanti 3, Ravi Anand 4, Sugata Gangopadhyay 2 1 Indian Statistical Institute, Kolkata, subho@isical.ac.in 2 Indian Institute

More information

state-recovery analysis of spritz

state-recovery analysis of spritz state-recovery analysis of spritz Ralph Ankele 1 Stefan Kölbl 2 Christian Rechberger 2 August 25, 2015 1 RHUL, Royal Holloway University of London, United Kingdom 2 DTU Compute, Technical University of

More information

Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles

Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles Salsa0 Cryptanalysis: New Moves and Revisiting Old Styles Subhamoy Maitra 1, Goutam Paul 1, Willi Meier 1 Indian Statistical Institute, Kolkata, India {subho,goutam.paul}@isical.ac.in FHNW, Windisch, Switzerland

More information

Distinguishing Attacks on the Stream Cipher Py

Distinguishing Attacks on the Stream Cipher Py Distinguishing Attacks on the Stream Cipher Py Souradyuti Paul, Bart Preneel, and Gautham Sekar Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg 10, B 3001, Leuven-Heverlee, Belgium

More information

Improved Cascaded Stream Ciphers Using Feedback

Improved Cascaded Stream Ciphers Using Feedback Improved Cascaded Stream Ciphers Using Feedback Lu Xiao 1, Stafford Tavares 1, Amr Youssef 2, and Guang Gong 3 1 Department of Electrical and Computer Engineering, Queen s University, {xiaolu, tavares}@ee.queensu.ca

More information

Analysis of Burn-in period for RC4 State Transition

Analysis of Burn-in period for RC4 State Transition Analysis of Burn-in period for RC4 State Transition Goutam Paul and Souik Ray Indian Statistical Institute, Kolkata 700 108, India. goutam.paul@isical.ac.in, souikr974@gmail.com Abstract. The internal

More information

A New Distinguisher on Grain v1 for 106 rounds

A New Distinguisher on Grain v1 for 106 rounds A New Distinguisher on Grain v1 for 106 rounds Santanu Sarkar Department of Mathematics, Indian Institute of Technology, Sardar Patel Road, Chennai 600036, India. sarkar.santanu.bir@gmail.com Abstract.

More information

Cryptanalysis of the Stream Cipher DECIM

Cryptanalysis of the Stream Cipher DECIM Cryptanalysis of the Stream Cipher DECIM Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun, bart.preneel}@esat.kuleuven.be

More information

On the structural weakness of the GGHN stream cipher

On the structural weakness of the GGHN stream cipher Cryptogr. Commun. (2010) 2:1 17 DOI 10.1007/s12095-009-0013-3 On the structural weakness of the GGHN stream cipher Aleksandar Kircanski Amr M. Youssef Received: 24 January 2009 / Accepted: 9 September

More information

Distinguishing Attack on Common Scrambling Algorithm

Distinguishing Attack on Common Scrambling Algorithm 410 The International Arab Journal of Information Technology, Vol. 12, No. 4, July 2015 Distinguishing Attack on Common Scrambling Algorithm Kai Zhang and Jie Guan Zhengzhou Information Science and Technology

More information

Stream Ciphers: Cryptanalytic Techniques

Stream Ciphers: Cryptanalytic Techniques Stream Ciphers: Cryptanalytic Techniques Thomas Johansson Department of Electrical and Information Technology. Lund University, Sweden ECRYPT Summer school 2007 (Lund University) Stream Ciphers: Cryptanalytic

More information

Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles

Salsa20 Cryptanalysis: New Moves and Revisiting Old Styles Salsa0 Cryptanalysis: New Moves and Revisiting Old Styles Subhamoy Maitra, Goutam Paul, Willi Meier To cite this version: Subhamoy Maitra, Goutam Paul, Willi Meier. Salsa0 Cryptanalysis: New Moves and

More information

An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks

An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks Proc 8th Australasian Information Security Conference AISC 010, Brisbane, Australia An Analysis of the RC4 Family of Stream Ciphers against Algebraic Attacks Kenneth Koon-Ho Wong 1 Gary Carter 1 Ed Dawson

More information

Block Cipher Cryptanalysis: An Overview

Block Cipher Cryptanalysis: An Overview 0/52 Block Cipher Cryptanalysis: An Overview Subhabrata Samajder Indian Statistical Institute, Kolkata 17 th May, 2017 0/52 Outline Iterated Block Cipher 1 Iterated Block Cipher 2 S-Boxes 3 A Basic Substitution

More information

Cryptanalysis of the Stream Cipher ABC v2

Cryptanalysis of the Stream Cipher ABC v2 Cryptanalysis of the Stream Cipher ABC v2 Hongjun Wu and Bart Preneel Katholieke Universiteit Leuven, ESAT/SCD-COSIC Kasteelpark Arenberg 10, B-3001 Leuven-Heverlee, Belgium {wu.hongjun,bart.preneel}@esat.kuleuven.be

More information

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers (Extended Abstract)

New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers (Extended Abstract) New Distinguishers for Reduced Round Trivium and Trivia-SC using Cube Testers (Extended Abstract) Anubhab Baksi 1, Subhamoy Maitra 1, Santanu Sarkar 2 1 Indian Statistical Institute, 203 B. T. Road, Kolkata

More information

Analysing and Exploiting the Mantin Biases in RC4

Analysing and Exploiting the Mantin Biases in RC4 Analysing and Exploiting the Mantin Biases in RC4 Remi Bricout 1, Sean Murphy 2, Kenneth G. Paterson 2, and Thyla van der Merwe 2 1 ENS, Paris 2 Royal Holloway, University of London Abstract. We explore

More information

Linear Approximations for 2-round Trivium

Linear Approximations for 2-round Trivium Linear Approximations for 2-round Trivium Meltem Sönmez Turan 1, Orhun Kara 2 1 Institute of Applied Mathematics, Middle East Technical University Ankara, Turkey msonmez@metu.edu.tr 2 TUBITAK-UEKAE, Gebze,

More information

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden

Stream ciphers I. Thomas Johansson. May 16, Dept. of EIT, Lund University, P.O. Box 118, Lund, Sweden Dept. of EIT, Lund University, P.O. Box 118, 221 00 Lund, Sweden thomas@eit.lth.se May 16, 2011 Outline: Introduction to stream ciphers Distinguishers Basic constructions of distinguishers Various types

More information

Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words

Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words Distinguishing Attacks on Stream Ciphers Based on Arrays of Pseudo-random Words Nathan Keller and Stephen D. Miller Abstract In numerous modern stream ciphers, the internal state consists of a large array

More information

Dynamic Cube Attack on 105 round Grain v1

Dynamic Cube Attack on 105 round Grain v1 Noname manuscript No. (will be inserted by the editor) Dynamic Cube Attack on 105 round Grain v1 Subhadeep Banik Received: date / Accepted: date Abstract As far as the Differential Cryptanalysis of reduced

More information

Further Results on Implicit Factoring in Polynomial Time

Further Results on Implicit Factoring in Polynomial Time Further Results on Implicit Factoring in Polynomial Time Santanu Sarkar and Subhamoy Maitra Indian Statistical Institute, 203 B T Road, Kolkata 700 108, India {santanu r, subho}@isical.ac.in Abstract.

More information

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies

SOBER Cryptanalysis. Daniel Bleichenbacher and Sarvar Patel Bell Laboratories Lucent Technologies SOBER Cryptanalysis Daniel Bleichenbacher and Sarvar Patel {bleichen,sarvar}@lucent.com Bell Laboratories Lucent Technologies Abstract. SOBER is a new stream cipher that has recently been developed by

More information

Analysis of Modern Stream Ciphers

Analysis of Modern Stream Ciphers Analysis of Modern Stream Ciphers Josef Pieprzyk Centre for Advanced Computing Algorithms and Cryptography, Macquarie University, Australia CANS - Singapore - December 2007 estream Outline 1. estream Project

More information

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound

Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Balanced Boolean Function on 13-variables having Nonlinearity strictly greater than the Bent Concatenation Bound Subhamoy Maitra Applied Statistics Unit, Indian Statistical Institute, 203 B T Road, Kolkata

More information

Alternative Approaches: Bounded Storage Model

Alternative Approaches: Bounded Storage Model Alternative Approaches: Bounded Storage Model A. Würfl 17th April 2005 1 Motivation Description of the Randomized Cipher 2 Motivation Motivation Description of the Randomized Cipher Common practice in

More information

Linear Cryptanalysis of Reduced-Round PRESENT

Linear Cryptanalysis of Reduced-Round PRESENT Linear Cryptanalysis of Reduced-Round PRESENT Joo Yeon Cho 1 Helsinki University of Technology, Finland 2 Nokia A/S, Denmark joo.cho@tkk.fi Abstract. PRESENT is a hardware-oriented block cipher suitable

More information

Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network

Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network Distinguishing Attacks on a Kind of Generalized Unbalanced Feistel Network Ruilin Li, Bing Sun, and Chao Li Department of Mathematics and System Science, Science College, National University of Defense

More information

Cryptanalysis of the Light-Weight Cipher A2U2 First Draft version

Cryptanalysis of the Light-Weight Cipher A2U2 First Draft version Cryptanalysis of the Light-Weight Cipher A2U2 First Draft version Mohamed Ahmed Abdelraheem, Julia Borghoff, Erik Zenner Technical University of Denmark, DK-2800 Kgs. Lyngby, Denmark {M.A.Abdelraheem,J.Borghoff,E.Zenner}@mat.dtu.dk

More information

How Fast can be Algebraic Attacks on Block Ciphers?

How Fast can be Algebraic Attacks on Block Ciphers? How Fast can be Algebraic Attacks on Block Ciphers? Nicolas T. Courtois Axalto mart Cards, 36-38 rue de la Princesse BP 45, 78430 Louveciennes Cedex, France http://www.nicolascourtois.net courtois@minrank.org

More information

Differential Fault Analysis of Trivium

Differential Fault Analysis of Trivium Differential Fault Analysis of Trivium Michal Hojsík 1,2 and Bohuslav Rudolf 2,3 1 Department of Informatics, University of Bergen, N-5020 Bergen, Norway 2 Department of Algebra, Charles University in

More information

Linear Cryptanalysis

Linear Cryptanalysis Linear Cryptanalysis Linear cryptanalysis is a powerful method of cryptanalysis introduced by Matsui in 1993 [11]. It is a known plaintext attack in which the attacker studies the linear approximations

More information

Statistical and Algebraic Properties of DES

Statistical and Algebraic Properties of DES Statistical and Algebraic Properties of DES Stian Fauskanger 1 and Igor Semaev 2 1 Norwegian Defence Research Establishment (FFI), PB 25, 2027 Kjeller, Norway 2 Department of Informatics, University of

More information

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017

COS433/Math 473: Cryptography. Mark Zhandry Princeton University Spring 2017 COS433/Math 473: Cryptography Mark Zhandry Princeton University Spring 27 Previously on COS 433 Security Experiment/Game (One- time setting) b m, m M c Challenger k ß K c ß Enc(k,m b ) b IND-Exp b ( )

More information

Improved Analysis of Some Simplified Variants of RC6

Improved Analysis of Some Simplified Variants of RC6 Improved Analysis of Some Simplified Variants of RC6 Scott Contini 1, Ronald L. Rivest 2, M.J.B. Robshaw 1, and Yiqun Lisa Yin 1 1 RSA Laboratories, 2955 Campus Drive San Mateo, CA 94403, USA {scontini,matt,yiqun}@rsa.com

More information

Breaking the F-FCSR-H Stream Cipher in Real Time

Breaking the F-FCSR-H Stream Cipher in Real Time Breaking the F-FCSR-H Stream Cipher in Real Time Martin Hell and Thomas Johansson Dept. of Electrical and Information Technology, Lund University, P.O. Box 118, 221 00 Lund, Sweden Abstract. The F-FCSR

More information

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers

Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Maximum Correlation Analysis of Nonlinear S-boxes in Stream Ciphers Muxiang Zhang 1 and Agnes Chan 2 1 GTE Laboratories Inc., 40 Sylvan Road LA0MS59, Waltham, MA 02451 mzhang@gte.com 2 College of Computer

More information

Linear Cryptanalysis of RC5 and RC6

Linear Cryptanalysis of RC5 and RC6 Linear Cryptanalysis of RC5 and RC6 Johan Borst, Bart Preneel, and Joos Vandewalle K.U. Leuven, Dept. Elektrotechniek-ESAT/COSIC Kardinaal Mercierlaan 94, B-3001 Heverlee Belgium Johan.Borst@esat.kuleuven.ac.be

More information

Differential-Linear Cryptanalysis of Serpent

Differential-Linear Cryptanalysis of Serpent Differential-Linear Cryptanalysis of Serpent Eli Biham, 1 Orr Dunkelman, 1 Nathan Keller 2 1 Computer Science Department, Technion. Haifa 32000, Israel {biham,orrd}@cs.technion.ac.il 2 Mathematics Department,

More information

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON

Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Improved Linear (hull) Cryptanalysis of Round-reduced Versions of SIMON Danping Shi 1,2, Lei Hu 1,2, Siwei Sun 1,2, Ling Song 1,2, Kexin Qiao 1,2, Xiaoshuang Ma 1,2 1 State Key Laboratory of Information

More information

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay

GENERALIZED NONLINEARITY OF S-BOXES. Sugata Gangopadhyay Volume X, No. 0X, 0xx, X XX doi:0.3934/amc.xx.xx.xx GENERALIZED NONLINEARITY OF -BOXE ugata Gangopadhyay Department of Computer cience and Engineering, Indian Institute of Technology Roorkee, Roorkee 47667,

More information

A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS

A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS A GENERAL FRAMEWORK FOR GUESS-AND-DETERMINE AND TIME-MEMORY-DATA TRADE-OFF ATTACKS ON STREAM CIPHERS Guanhan Chew, Khoongming Khoo DSO National Laboratories, 20 Science Park Drive, Singapore 118230 cguanhan,kkhoongm@dso.org.sg

More information

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography

Lecture 1: Perfect Secrecy and Statistical Authentication. 2 Introduction - Historical vs Modern Cryptography CS 7880 Graduate Cryptography September 10, 2015 Lecture 1: Perfect Secrecy and Statistical Authentication Lecturer: Daniel Wichs Scribe: Matthew Dippel 1 Topic Covered Definition of perfect secrecy One-time

More information

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version)

A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) A Forgery Attack on the Candidate LTE Integrity Algorithm 128-EIA3 (updated version) Thomas Fuhr, Henri Gilbert, Jean-René Reinhard, and Marion Videau ANSSI, France Abstract In this note we show that the

More information

Affine equivalence in the AES round function

Affine equivalence in the AES round function Discrete Applied Mathematics 148 (2005) 161 170 www.elsevier.com/locate/dam Affine equivalence in the AES round function A.M. Youssef a, S.E. Tavares b a Concordia Institute for Information Systems Engineering,

More information

New State Recovery Attack on RC4

New State Recovery Attack on RC4 New State Recovery Attack on RC4 Alexander Maximov and Dmitry Khovratovich Laboratory of Algorithmics, Cryptology and Security University of Luxembourg 6, rue Richard Coudenhove-Kalergi, L-1359 Luxembourg

More information

MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher

MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher MILP-based Cube Attack on the Reduced-Round WG-5 Lightweight Stream Cipher Raghvendra Rohit, Riham AlTawy, & Guang Gong Department of Electrical and Computer Engineering, University of Waterloo Waterloo,

More information

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6

U.C. Berkeley CS276: Cryptography Luca Trevisan February 5, Notes for Lecture 6 U.C. Berkeley CS276: Cryptography Handout N6 Luca Trevisan February 5, 2009 Notes for Lecture 6 Scribed by Ian Haken, posted February 8, 2009 Summary The encryption scheme we saw last time, based on pseudorandom

More information

Cryptanalysis of SP Networks with Partial Non-Linear Layers

Cryptanalysis of SP Networks with Partial Non-Linear Layers Cryptanalysis of SP Networks with Partial Non-Linear Layers Achiya Bar-On 1, Itai Dinur 2, Orr Dunkelman 3, Nathan Keller 1, Virginie Lallemand 4, and Boaz Tsaban 1 1 Bar-Ilan University, Israel 2 École

More information

Introduction on Block cipher Yoyo Game Application on AES Conclusion. Yoyo Game with AES. Navid Ghaedi Bardeh. University of Bergen.

Introduction on Block cipher Yoyo Game Application on AES Conclusion. Yoyo Game with AES. Navid Ghaedi Bardeh. University of Bergen. Yoyo Game with AES Navid Ghaedi Bardeh University of Bergen May 8, 2018 1 / 33 Outline 1 Introduction on Block cipher 2 Yoyo Game 3 Application on AES 4 Conclusion 2 / 33 Classical Model of Symmetric Cryptography

More information

Lecture 4 - Computational Indistinguishability, Pseudorandom Generators

Lecture 4 - Computational Indistinguishability, Pseudorandom Generators Lecture 4 - Computational Indistinguishability, Pseudorandom Generators Boaz Barak September 27, 2007 Computational Indistinguishability Recall that we defined that statistical distance of two distributions

More information

ACORN: A Lightweight Authenticated Cipher (v3)

ACORN: A Lightweight Authenticated Cipher (v3) ACORN: A Lightweight Authenticated Cipher (v3) Designer and Submitter: Hongjun Wu Division of Mathematical Sciences Nanyang Technological University wuhongjun@gmail.com 2016.09.15 Contents 1 Specification

More information

Linear Cryptanalysis of Reduced-Round Speck

Linear Cryptanalysis of Reduced-Round Speck Linear Cryptanalysis of Reduced-Round Speck Tomer Ashur Daniël Bodden KU Leuven and iminds Dept. ESAT, Group COSIC Address Kasteelpark Arenberg 10 bus 45, B-3001 Leuven-Heverlee, Belgium tomer.ashur-@-esat.kuleuven.be

More information

Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia)

Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia) Simple Pseudorandom Number Generator with Strengthened Double Encryption (Cilia) Henry Ng Henry.Ng.a@gmail.com Abstract. A new cryptographic pseudorandom number generator Cilia is presented. It hashes

More information

Differential Attack on Five Rounds of the SC2000 Block Cipher

Differential Attack on Five Rounds of the SC2000 Block Cipher Differential Attack on Five Rounds of the SC2 Block Cipher Jiqiang Lu Department of Mathematics and Computer Science, Eindhoven University of Technology, 56 MB Eindhoven, The Netherlands lvjiqiang@hotmail.com

More information

The Hash Function JH 1

The Hash Function JH 1 The Hash Function JH 1 16 January, 2011 Hongjun Wu 2,3 wuhongjun@gmail.com 1 The design of JH is tweaked in this report. The round number of JH is changed from 35.5 to 42. This new version may be referred

More information

Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher

Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher Related-Key Rectangle Attack on Round-reduced Khudra Block Cipher Xiaoshuang Ma 1,2 Kexin Qiao 1,2 1 State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy

More information

Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses

Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses Related-key Attacks on the Py-family of Ciphers and an Approach to Repair the Weaknesses Gautham Sekar, Souradyuti Paul and Bart Preneel Katholieke Universiteit Leuven, Dept. ESAT/COSIC, Kasteelpark Arenberg

More information

Impossible Differential Cryptanalysis of Mini-AES

Impossible Differential Cryptanalysis of Mini-AES Impossible Differential Cryptanalysis of Mini-AES Raphael Chung-Wei Phan ADDRESS: Swinburne Sarawak Institute of Technology, 1 st Floor, State Complex, 93576 Kuching, Sarawak, Malaysia. rphan@swinburne.edu.my

More information

Intro to Public Key Cryptography Diffie & Hellman Key Exchange

Intro to Public Key Cryptography Diffie & Hellman Key Exchange Introduction to Modern Cryptography Lecture 5 Number Theory: 1. Quadratic residues. 2. The discrete log problem. Intro to Public Key Cryptography Diffie & Hellman Key Exchange Course Summary - Math Part

More information

Division Property: a New Attack Against Block Ciphers

Division Property: a New Attack Against Block Ciphers Division Property: a New Attack Against Block Ciphers Christina Boura (joint on-going work with Anne Canteaut) Séminaire du groupe Algèbre et Géometrie, LMV November 24, 2015 1 / 50 Symmetric-key encryption

More information

Computing the biases of parity-check relations

Computing the biases of parity-check relations Computing the biases of parity-check relations Anne Canteaut INRIA project-team SECRET B.P. 05 7853 Le Chesnay Cedex, France Email: Anne.Canteaut@inria.fr María Naya-Plasencia INRIA project-team SECRET

More information

THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER. A. A. Zadeh and Howard M. Heys

THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER. A. A. Zadeh and Howard M. Heys THEORETICAL SIMPLE POWER ANALYSIS OF THE GRAIN STREAM CIPHER A. A. Zadeh and Howard M. Heys Electrical and Computer Engineering Faculty of Engineering and Applied Science Memorial University of Newfoundland

More information

Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent

Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent Experiments on the Multiple Linear Cryptanalysis of Reduced Round Serpent B. Collard, F.-X. Standaert, J.-J. Quisquater UCL Crypto Group Microelectronics Laboratory Catholic University of Louvain - UCL

More information

Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128

Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-128 Impossible Differential-Linear Cryptanalysis of Reduced-Round CLEFIA-8 Zheng Yuan,,, ian Li, Beijing Electronic Science & Technology Institute, Beijing 7, P.R. China zyuan@tsinghua.edu.cn, sharonlee95@6.com

More information

CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent

CONSTRUCTING Boolean functions on odd number of variables n having nonlinearity greater than the bent Patterson-Wiedemann type functions on 21 variables with Nonlinearity greater than Bent Concatenation bound Selçuk Kavut and Subhamoy Maitra 1 Abstract Nonlinearity is one of the most challenging combinatorial

More information

Lecture 12: Block ciphers

Lecture 12: Block ciphers Lecture 12: Block ciphers Thomas Johansson T. Johansson (Lund University) 1 / 19 Block ciphers A block cipher encrypts a block of plaintext bits x to a block of ciphertext bits y. The transformation is

More information

On the Salsa20 Core Function

On the Salsa20 Core Function On the Salsa20 Core Function Julio Cesar Hernandez-Castro, Juan M. E. Tapiador, and Jean-Jacques Quisquater Crypto Group, DICE, Universite Louvain-la-Neuve Place du Levant, 1 B-1348 Louvain-la-Neuve, Belgium

More information

Analysis and Implementation of RC4 Stream Cipher

Analysis and Implementation of RC4 Stream Cipher Analysis and Implementation of RC4 Stream Cipher A thesis presented to Indian Statistical Institute in fulfillment of the thesis requirement for the degree of Doctor of Philosophy in Computer Science by

More information

Security of Random Feistel Schemes with 5 or more Rounds

Security of Random Feistel Schemes with 5 or more Rounds Security of Random Feistel Schemes with 5 or more Rounds Jacques Patarin Université de Versailles 45 avenue des Etats-Unis 78035 Versailles Cedex - France Abstract. We study cryptographic attacks on random

More information

DD2448 Foundations of Cryptography Lecture 3

DD2448 Foundations of Cryptography Lecture 3 DD2448 Foundations of Cryptography Lecture 3 Douglas Wikström KTH Royal Institute of Technology dog@kth.se February 3, 2016 Linear Cryptanalysis of the SPN Basic Idea Linearize Find an expression of the

More information

Improved distinguishers for HC-128

Improved distinguishers for HC-128 Improved distinguishers for HC-128 Stankovski, Paul; Ruj, Sushmita; Hell, Martin; Johansson, Thomas Published in: Designs, Codes and Cryptography DOI: 10.1007/s10623-011-9550-9 2012 Link to publication

More information

Algebraic Techniques in Differential Cryptanalysis

Algebraic Techniques in Differential Cryptanalysis Algebraic Techniques in Differential Cryptanalysis Martin Albrecht and Carlos Cid Information Security Group, Royal Holloway, University of London FSE 2009, Leuven, 24.02.2009 Martin Albrecht and Carlos

More information