Cache Timing Analysis of RC4 - Archive ouverte HAL Accéder directement au contenu
Communication Dans Un Congrès Année : 2011

Cache Timing Analysis of RC4

Résumé

In this paper we present an attack that recovers the whole internal state of RC4 using a cache timing attack model first introduced in the cache timing attack of Osvik, Shamir and Tromer against some highly efficient AES implementations. In this model, the adversary can obtain some information related to the elements of a secret state used during the encryption process. Zenner formalized this model for LFSR-based stream ciphers. In this theoretical model inspired from practical attacks, we propose a new state recovery analysis on RC4 using a belief propagation algorithm. The algorithm works well and its soundness is proved for known or unknown plaintext and only requires that the attacker queries the RC4 encryption process byte by byte for a practical attack. Depending on the processor, our simulations show that we need between 300 to 1,300 keystream bytes and a computation time of less than a minute.

Dates et versions

hal-01110389 , version 1 (28-01-2015)

Identifiants

Citer

Thomas Chardin, Pierre-Alain Fouque, Delphine Leresteux. Cache Timing Analysis of RC4. ACNS 2011 - 9th International Conference Applied Cryptography and Network Security, Jun 2011, Nerja, Spain. pp.110-129, ⟨10.1007/978-3-642-21554-4_7⟩. ⟨hal-01110389⟩
90 Consultations
0 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More