The effectiveness of brute force attacks on RC4

被引:5
|
作者
Couture, N [1 ]
Kent, KB [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
关键词
D O I
10.1109/DNSR.2004.1344747
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. The RC4 cipher, utilized primarily in the area of data communications, is being used in this paper as a test case for determining the effectiveness of exhaustive key-searches implemented on FPGAs using a Network on Chip (NoC) design architecture. Preliminary results show that a network of key-checker units implemented on a Xilinx XC2V1000 FPGA using the Celoxica DK2 design tools can exploit the speed and parallelism of hardware such that the entire key-space of a 40-bit RC4 encryption can be searched in minutes. Furthermore, it has been found that the clock rate of the circuit diminishes as the number of key-checker units increases. Future work is proposed to find a method for predicting an optimal balance between the size of the network (# of key-checker units) and the clock rate in order to maximize performance.
引用
收藏
页码:333 / 336
页数:4
相关论文
共 50 条
  • [21] Refined Glimpse Correlations of RC4
    Ito, Ryoma
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2016, E99A (01) : 3 - 13
  • [22] RC4 State and Its Applications
    Yu, Qian
    Zhang, Chang N.
    2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 264 - 269
  • [23] A practical attack on broadcast RC4
    Mantin, I
    Shamir, A
    FAST SOFTWARE ENCRYPTION, 2002, 2355 : 152 - 164
  • [24] Cache Timing Analysis of RC4
    Chardin, Thomas
    Fouque, Pierre-Alain
    Leresteux, Delphine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 110 - 129
  • [25] Analysis methods for (alleged) RC4
    Knudsen, LR
    Meier, W
    Preneel, B
    Rijmen, V
    Verdoolaege, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 327 - 341
  • [26] Detecting Brute-Force Attacks on Cryptocurrency Wallets
    Kiktenko, E. O.
    Kudinov, M. A.
    Fedorov, A. K.
    BUSINESS INFORMATION SYSTEMS WORKSHOPS, BIS 2019, 2019, 373 : 232 - 242
  • [27] Realtime Risk Monitoring of SSH Brute Force Attacks
    Fahrnberger, Guenter
    INNOVATIONS FOR COMMUNITY SERVICES, I4CS 2022, 2022, 1585 : 75 - 95
  • [28] (Not so) random shuffles of RC4
    Mironov, I
    ADVANCES IN CRYPTOLOGY - CRYPTO 2002, PROCEEDINGS, 2002, 2442 : 304 - 319
  • [29] How Not to Combine RC4 States
    Banik, Subhadeep
    Jha, Sonu
    SECURITY, PRIVACY, AND APPLIED CRYPTOGRAPHY ENGINEERING (SPACE 2015), 2015, 9354 : 95 - 112
  • [30] Attack on Broadcast RC4 Revisited
    Maitra, Subhamoy
    Paul, Goutam
    Sen Gupta, Sourav
    FAST SOFTWARE ENCRYPTION (FSE 2011), 2011, 6733 : 199 - 217