The effectiveness of brute force attacks on RC4

被引:5
|
作者
Couture, N [1 ]
Kent, KB [1 ]
机构
[1] Univ New Brunswick, Fac Comp Sci, Fredericton, NB E3B 5A3, Canada
关键词
D O I
10.1109/DNSR.2004.1344747
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
The security of encryption algorithms depends heavily on the computational infeasibility of exhaustive key-space searches. The RC4 cipher, utilized primarily in the area of data communications, is being used in this paper as a test case for determining the effectiveness of exhaustive key-searches implemented on FPGAs using a Network on Chip (NoC) design architecture. Preliminary results show that a network of key-checker units implemented on a Xilinx XC2V1000 FPGA using the Celoxica DK2 design tools can exploit the speed and parallelism of hardware such that the entire key-space of a 40-bit RC4 encryption can be searched in minutes. Furthermore, it has been found that the clock rate of the circuit diminishes as the number of key-checker units increases. Future work is proposed to find a method for predicting an optimal balance between the size of the network (# of key-checker units) and the clock rate in order to maximize performance.
引用
收藏
页码:333 / 336
页数:4
相关论文
共 50 条
  • [41] Protecting financial institutions from brute-force attacks
    Herley, Cormac
    Florencio, Dinei
    PROCEEDINGS OF THE IFIP TC 11/ 23RD INTERNATIONAL INFORMATION SECURITY CONFERENCE, 2008, : 681 - 685
  • [42] Machine Learning for Detecting Brute Force Attacks at the Network Level
    Najafabadi, Maryam M.
    Khoshgoftaar, Taghi M.
    Kemp, Clifford
    Seliya, Naeem
    Zuech, Richard
    2014 IEEE INTERNATIONAL CONFERENCE ON BIOINFORMATICS AND BIOENGINEERING (BIBE), 2014, : 379 - 385
  • [43] Key Collisions of the RC4 Stream Cipher
    Matsui, Mitsuru
    FAST SOFTWARE ENCRYPTION, 2009, 5665 : 38 - 50
  • [44] Analysing and exploiting the Mantin biases in RC4
    Remi Bricout
    Sean Murphy
    Kenneth G. Paterson
    Thyla van der Merwe
    Designs, Codes and Cryptography, 2018, 86 : 743 - 770
  • [45] An approach to assess the optimality of refining RC4
    Das, Suman
    Dey, Hemanta
    Ghosh, Ranjan
    2015 THIRD INTERNATIONAL CONFERENCE ON COMPUTER, COMMUNICATION, CONTROL AND INFORMATION TECHNOLOGY (C3IT), 2015,
  • [46] Settling the mystery of Zr = r in RC4
    Dey, Sabyasachi
    Sarkar, Santanu
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2019, 11 (04): : 697 - 715
  • [47] RC4 Algorithm Visualization for Cryptography Education
    Sriadhi, S.
    Rahim, Robbi
    Ahmar, Ansari Saleh
    2ND INTERNATIONAL CONFERENCE ON STATISTICS, MATHEMATICS, TEACHING, AND RESEARCH 2017, 2018, 1028
  • [48] A new variant of RC4 stream cipher
    Khine, Lae Lae
    World Academy of Science, Engineering and Technology, 2009, 38 : 1049 - 1052
  • [49] 流密码与RC4算法
    宋维平
    吉林师范大学学报(自然科学版), 2005, (02) : 71 - 72
  • [50] RC4随机序列变换检测
    吴悠漾
    刘祎飞
    林旭
    中国新通信, 2016, 18 (19) : 77 - 77