[Resource Topic] 2013/176: Distinguishing Attacks on RC4 and A New Improvement of the Cipher

Welcome to the resource topic for 2013/176

Title:
Distinguishing Attacks on RC4 and A New Improvement of the Cipher

Authors: Jing Lv, Bin Zhang, Dongdai Lin

Abstract:

RC4, designed by Rivest in 1987, is the most widely deployed stream cipher in practical applications. In this paper, two new class of statistical biases inherent in RC4 are depicted and it is shown that the RC4 keystream is distinguishable from random no matter how many initial bytes have been dumped. RC4A, proposed by Paul and Preneel at FSE 2004 to strengthen the security of RC4, is also found to be vulnerable to similar attacks. Instead, a new pseudorandom bit generator RC4B is proposed, which is believed to provide better immunity against the known attacks.

ePrint: https://eprint.iacr.org/2013/176

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .