International Association for Cryptologic Research

International Association
for Cryptologic Research

CryptoDB

New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4

Authors:
Subhamoy Maitra
Goutam Paul
Download:
URL: http://eprint.iacr.org/2007/261
Search ePrint
Search Google
Abstract: Consider the permutation $S$ in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, the initial bytes of the permutation, i.e., $S[y]$ for small values of $y$ are biased towards some linear combination of secret key bytes. In this paper, for the first time we show that the bias can be observed in $S[S[y]]$ too. Based on this new form of permuatation bias after the KSA and other related results, a complete framework is presented to show that many keystream output bytes of RC4 are significantly biased towards several linear combinations of the secret key bytes. The results do not assume any condition on the secret key. We find new biases in the initial as well as in the 256-th and 257-th keystream output bytes. For the first time biases at such later stages are discovered without any knowledge of secret key bytes. We also identify that these biases propagate further once the information for the index $j$ is revealed.
BibTeX
@misc{eprint-2007-13542,
  title={New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4},
  booktitle={IACR Eprint archive},
  keywords={secret-key cryptography / Bias, Cryptanalysis, Keystream, RC4, Stream Cipher.},
  url={http://eprint.iacr.org/2007/261},
  note={ subho@isical.ac.in 13850 received 3 Jul 2007, last revised 3 Dec 2007},
  author={Subhamoy Maitra and Goutam Paul},
  year=2007
}