Paper 2016/455
Extracting the RC4 secret key of the Open Smart Grid Protocol
Linus Feiten and Matthias Sauer
Abstract
The Open Smart Grid Protocol (OSGP) is a widely used industry standard for exchanging sensitive data between devices inside of smart grids. For message confidentiality, OSGP implements a customised form of the RC4 stream cipher. In this work, we show how already known weaknesses of RC4 can be exploited to successfully attack the OSGP implementation as well. The attack modification is able to effectively derive the secret OSGP encryption and decryption key, given that an attacker can accumulate the cipher streams of approximately 90,000 messages. The possession of this key allows the attacker to decrypt all data intercepted on the OSGP smart grid and thereby obtain privacy critical information of its participants.
Note: An abbreviated version of this paper has been presented at the Workshop "Industrial Control System Security (ICSS)" at the Annual Computer Security Applications Conference 2015 (ACSAC 31). https://www.acsac.org/2015/workshops/icss/ This version includes extended examples, formulas and a description of RC4.
Metadata
- Available format(s)
- Category
- Applications
- Publication info
- Preprint. MINOR revision.
- Keywords
- CryptographySecurityRC4Smart GridProtocol
- Contact author(s)
- feiten @ informatik uni-freiburg de
- History
- 2016-05-13: received
- Short URL
- https://ia.cr/2016/455
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2016/455, author = {Linus Feiten and Matthias Sauer}, title = {Extracting the {RC4} secret key of the Open Smart Grid Protocol}, howpublished = {Cryptology {ePrint} Archive, Paper 2016/455}, year = {2016}, url = {https://eprint.iacr.org/2016/455} }