Apart from the secret key, the cipher uses two other inputs, namely, initial value and initial vector. Although these inputs are fixed in the cipher specification, some applications may allow the inputs to be under the attacker control. Assuming that the attacker can control the initial value, we show a distinguisher for the cipher and a secret key recovery attack that for the \textit{L}-bit secret key, is able to recover it with about $(L/n)\cdot 2^n $ steps. The attack has been implemented on a standard PC and can reconstruct the secret key of RC(8,32) in less than a second.
Category / Keywords: secret-key cryptography / $RC4(n,m)$ Stream cipher; Cryptanalysis; Key Recovery Attack; Distinguishing Attack; RC4-like cipher; Weak Keys; Weak States Date: received 28 Mar 2013 Contact author: orumiehchi at gmail com Available format(s): PDF | BibTeX Citation Version: 20130401:131014 (All versions of this report) Short URL: ia.cr/2013/178 Discussion forum: Show discussion | Start new discussion