Some New Weaknesses in the RC4 Stream Cipher

Jing Lv,Bin Zhang,Dongdai Lin
DOI: https://doi.org/10.1007/978-3-319-05149-9_2
2013-01-01
Abstract:In FSE 2011, Maitra and Paul observed that there exists negative bias in the first byte of the RC4 keystream towards 0. In this paper, we give our theoretical proof of this bias. This bias immediately provide distinguisher for RC4, and ciphertext only attack on broadcast RC4. Additionally, we discover some new weaknesses of the keystream bytes even after the first <InlineEquation ID=\"IEq1\" <EquationSource Format=\"TEX\"$$N$$</EquationSource> <EquationSource Format=\"MATHML\" <math xmlns:xlink=\"http://www.w3.org/1999/xlink\" <mi>N</mi> </math> </EquationSource> </InlineEquation> rounds of the PRGA, where <InlineEquation ID=\"IEq2\" <EquationSource Format=\"TEX\"$$N$$</EquationSource> <EquationSource Format=\"MATHML\" <math xmlns:xlink=\"http://www.w3.org/1999/xlink\" <mi>N</mi> </math> </EquationSource> </InlineEquation> is the size of the RC4 permutation, generally, <InlineEquation ID=\"IEq3\" <EquationSource Format=\"TEX\"$$N=256$$</EquationSource> <EquationSource Format=\"MATHML\" <math xmlns:xlink=\"http://www.w3.org/1999/xlink\" <mrow> <mi>N</mi> <mo>=</mo> <mn>256</mn> </mrow> </math> </EquationSource> </InlineEquation>. The weaknesses in turn provide us with certain state information from the keystream bytes no matter how many initial bytes are thrown away.
What problem does this paper attempt to address?