Header menu link for other important links
X
Security Analysis of the RC4+ Stream Cipher
Subhadeep Banik, , Kacker Raghu
Published in Springer International Publishing
2013
Pages: 297 - 307
Abstract

The RC4+ stream cipher was proposed by Maitra and Paul at Indocrypt 2008. The authors had claimed that RC4+ ironed out most of the weaknesses of the alleged RC4 stream cipher and was only marginally slower than RC4 in software. In this paper we show that it is possible to mount a distinguishing attack on RC4+ based on the bias of the first output byte. The distinguisher requires around 226 samples produced by different keys of RC4+. In the second part of the paper we study the possibility of mounting the differential fault attack on RC4 proposed by Biham et. al. in FSE 2005, on RC4+. We will show that that the RC4+ is vulnerable to differential fault attack and it is possible to recover the entire internal state of the cipher at the beginning of the PRGA by injecting around 217.2 faults.

About the journal
JournalData powered by TypesetProgress in Cryptology – INDOCRYPT
PublisherData powered by TypesetSpringer International Publishing
Open AccessNo