Analysis of RC4 Algorithm Based on Its Single and Double Byte Bias by Using New Algorithms
Global Proceedings Repository
View Archive InfoField | Value | |
Title |
Analysis of RC4 Algorithm Based on Its Single and Double Byte Bias by Using New Algorithms
|
|
Creator |
Sura M. Searan
Ali M. Sagheer Maytham M. Hammood |
|
Description |
RC4 algorithm is one of the most widely used stream ciphers. It is fast, simple and suitable for software and hardware. It is used in many applications, but it has a weakness in the distribution of key stream bytes, the first few key stream bytes of PRNG are biased or related to some secret key bytes and thus the analysis of key stream bytes makes it possible to attack RC4, and there is a correlation between the key stream bytes that make it weak and breakable by single and double byte biases attack. This work shows the analysis of RC4 key stream based on its single and double byte biases by using new designed algorithms that calculate the bias in a standard time (seconds). Also, shows the single byte bias attack on RC4 by using the newly designed algorithm. The results are showed that the bias of RC4 keystream is proved and got the same results that were shown in the literature with less time and could retrieve the first 32 bytes of the plain text by using the proposed algorithm of single byte bias attack with a probability of 100%. The analysis of 256 positions is required additional requirements such as supercomputer and message passing interface environment that are not available in Iraq, therefore; the analysis is done for 32 positions.
|
|
Publisher |
Int'l Conference on Change, Innovation, Informatics and Disrurptuive Technology
|
|
Contributor |
—
|
|
Date |
2016-12-19 18:13:23
|
|
Type |
Peer-reviewed Paper
|
|
Format |
application/pdf
|
|
Identifier |
http://proceedings.sriweb.org/repository/index.php/ICCIIDT/icciidtt_london/paper/view/34
|
|
Source |
Int'l Conference on Change, Innovation, Informatics and Disrurptuive Technology; ICCIIDT London - UK
|
|
Language |
en
|
|
Rights |
Authors who submit to this conference agree to the following terms: a) Authors retain copyright over their work, while allowing the conference to place this unpublished work under a Creative Commons Attribution License, which allows others to freely access, use, and share the work, with an acknowledgement of the work's authorship and its initial presentation at this conference. b) Authors are able to waive the terms of the CC license and enter into separate, additional contractual arrangements for the non-exclusive distribution and subsequent publication of this work (e.g., publish a revised version in a journal, post it to an institutional repository or publish it in a book), with an acknowledgement of its initial presentation at this conference. c) In addition, authors are encouraged to post and share their work online (e.g., in institutional repositories or on their website) at any point before and after the conference. |
|