The effectiveness of brute force attacks on RC4

被引:5
|
作者
Couture, N [1 ]
Kent, KB [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
关键词
D O I
10.1109/DNSR.2004.1344747
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. The RC4 cipher, utilized primarily in the area of data communications, is being used in this paper as a test case for determining the effectiveness of exhaustive key-searches implemented on FPGAs using a Network on Chip (NoC) design architecture. Preliminary results show that a network of key-checker units implemented on a Xilinx XC2V1000 FPGA using the Celoxica DK2 design tools can exploit the speed and parallelism of hardware such that the entire key-space of a 40-bit RC4 encryption can be searched in minutes. Furthermore, it has been found that the clock rate of the circuit diminishes as the number of key-checker units increases. Future work is proposed to find a method for predicting an optimal balance between the size of the network (# of key-checker units) and the clock rate in order to maximize performance.
引用
收藏
页码:333 / 336
页数:4
相关论文
共 50 条
  • [1] GB-RC4: Effective brute force attacks on RC4 algorithm using GPU
    Xue, Pei
    Li, Tao
    Dong, Han
    Liu, Chunbo
    Ma, Wenjing
    Pei, Songwen
    2016 SEVENTH INTERNATIONAL GREEN AND SUSTAINABLE COMPUTING CONFERENCE (IGSC), 2016,
  • [2] Effective uses of FPGAs for brute-force attack on RC4 ciphers
    Kwok, Sammy H. M.
    Lam, Edmund Y.
    IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2008, 16 (08) : 1096 - 1100
  • [3] Attacks on the RC4 stream cipher
    Andreas Klein
    Designs, Codes and Cryptography, 2008, 48 : 269 - 286
  • [4] Attacks on the RC4 stream cipher
    Klein, Andreas
    DESIGNS CODES AND CRYPTOGRAPHY, 2008, 48 (03) : 269 - 286
  • [5] Statistical attacks on cookie masking for RC4
    Paterson, Kenneth G.
    Schuldt, Jacob C. N.
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 777 - 801
  • [6] Statistical attacks on cookie masking for RC4
    Kenneth G. Paterson
    Jacob C. N. Schuldt
    Cryptography and Communications, 2018, 10 : 777 - 801
  • [7] RC4 stream cipher and possible attacks on WEP
    Stosic, Lazar
    Bogdanovic, Milena
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2012, 3 (03) : 110 - 114
  • [8] Predicting and distinguishing attacks on RC4 keystream generator
    Mantin, I
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS, 2005, 3494 : 491 - 506
  • [9] Passive-only key recovery attacks on RC4
    Vaudenay, Serge
    Vuagnoux, Martin
    SELECTED AREAS IN CRYPTOGRAPHY, 2007, 4876 : 344 - 359
  • [10] Attacks Only Get Better: Password Recovery Attacks Against RC4 in TLS
    Garman, Christina
    Paterson, Kenneth G.
    Van der Merwe, Thyla
    PROCEEDINGS OF THE 24TH USENIX SECURITY SYMPOSIUM, 2015, : 113 - 128