Paper 2016/455

Extracting the RC4 secret key of the Open Smart Grid Protocol

Linus Feiten and Matthias Sauer

Abstract

The Open Smart Grid Protocol (OSGP) is a widely used industry standard for exchanging sensitive data between devices inside of smart grids. For message confidentiality, OSGP implements a customised form of the RC4 stream cipher. In this work, we show how already known weaknesses of RC4 can be exploited to successfully attack the OSGP implementation as well. The attack modification is able to effectively derive the secret OSGP encryption and decryption key, given that an attacker can accumulate the cipher streams of approximately 90,000 messages. The possession of this key allows the attacker to decrypt all data intercepted on the OSGP smart grid and thereby obtain privacy critical information of its participants.

Note: An abbreviated version of this paper has been presented at the Workshop "Industrial Control System Security (ICSS)" at the Annual Computer Security Applications Conference 2015 (ACSAC 31). https://www.acsac.org/2015/workshops/icss/ This version includes extended examples, formulas and a description of RC4.

Metadata
Available format(s)
PDF
Category
Applications
Publication info
Preprint. MINOR revision.
Keywords
CryptographySecurityRC4Smart GridProtocol
Contact author(s)
feiten @ informatik uni-freiburg de
History
2016-05-13: received
Short URL
https://ia.cr/2016/455
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2016/455,
      author = {Linus Feiten and Matthias Sauer},
      title = {Extracting the {RC4} secret key of the Open Smart Grid Protocol},
      howpublished = {Cryptology {ePrint} Archive, Paper 2016/455},
      year = {2016},
      url = {https://eprint.iacr.org/2016/455}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.