›› 2012, Vol. 42 ›› Issue (05): 1231-1236.

Previous Articles     Next Articles

Improvements against fault induction attack for RC4 algorithm

HU Liang1, CHI Ling1, YUAN Wei2, CHU Jian-feng2, XU Xiao-bo2   

  1. 1. College of Software, Jilin University, Changchun 130012,China;
    2. College of Computer Science and Technology, Changchun 130012, China
  • Received:2011-06-27 Online:2012-09-01 Published:2012-09-01

Abstract: The Fault Induction Attack (FIA) proposed by Adi Shamir is an effective method in cracking RC4 algorithm. The target of the FIA is the Pseudo-Random Generation (PGR) phase of the RC4 algorithm. To resist this attack, it is necessary to enhance the security of the PGR phase. This paper presents two improvements that make the nonlinear transformation more complex by adding the row shift and column shift to the PGR phase. After analyzing the validity, security and the efficiency of the FIA, it is demonstrated that the efficiency of using FIA is lower than using exhaustive attack, which means that the improvements could resist FIA. Comparison of the two improvements shows that the first improvement is more efficient and the second improvement is more secure.

Key words: computer system organization, RC4 algorithm, fault induction attack, nonlinear transformation, line shift

CLC Number: 

  • TP309.7
[1] Rivest R L. The RC4 encryption algorithm[Z]. RSA Data Security, Inc, 992.
[2] Forouzan Behrouz A. Cryptography and Network Security[M]. NewYork: McFraw-Hill, 2008.
[3] 谷利泽,郑世慧,杨义先. 现代密码学教程[M]. 北京:北京邮电大学出版社,2009.
[4] Hoch Jonathan J, Shamir Adi. Fault analysis of stream ciphers//CHES 2004.Berlin:Springer-Velag, 2004.
[5] 杜育松,沈静. 对RC4算法的故障引入攻击研究[J]. 电子科技大学学报,2009,38(2):253-257. Du Yu-song, Shen Jing. Research on fault induction attack on RC4 algorithm[J]. Journal of University of Electronic Science and Technology of China, 2009, 38(2): 253-257.
[6] Miyaji A, Sukegawa M. New analysis based on correlations of RC4 PRGA with nonzero-bit differences[J]. IEICE Transactions on Fundamentals of Electronic Communications and Computer Sciences, 2010, E93A(6): 1066-1077.
[7] Sichani M H, Movaghar A. A new analysis of RC4 a data mining approach(J48)//Proceesdings of the International Conference on Security and Cryptography, Portugal 2009.
[8] Biham E, Granboulan L, Nguyen P Q. Impossible fault analysis of RC4 and differential fault analysis of RC4//FSE 2005, Berlin,Germany: Springer-Verlag, 2005.
[9] Chen J G, Miyaji A. Generalized RC4 key collisions and hash collisions[J]. Lecture Notes in Computer Science, 2010, 6280:73-87.
[10] Chen J G, Miyaji A. New class of RC4 colliding key pairs with greater hamming distance[J]. Lecture Notes in Computer Science, 2010, 6047: 30-44.
[11] Matsui M. Key collisions of the RC4 stream cipher[J]. Lecture Notes in Computer Science, 2009, 5665: 38-50.
[1] ZHAO Bo, QIN Gui-He, ZHAO Yong-Zhe, YANG Wen-Di. Public key cryptosystem based on semi-trapdoor one-way function [J]. 吉林大学学报(工学版), 2018, 48(1): 259-267.
[2] YU Bin-bin, WU Xin-yu, CHU Jian-feng, HU Liang. Signature protocol for wireless sensor network based on group key agreement [J]. 吉林大学学报(工学版), 2017, 47(3): 924-929.
[3] WEI Xiao-hui, LI Xiang, LI Hong-liang, LI Cong, ZHUANG Yuan, YU Hong-mei. Flexible Online MapReduce model and topology protocols supporting large-scale stream data processing [J]. 吉林大学学报(工学版), 2016, 46(4): 1222-1231.
[4] CHE Xiang-jiu, LIANG Sen. Improved algorithm of SPIHT based on Max-Heap tree [J]. 吉林大学学报(工学版), 2016, 46(3): 865-869.
[5] FU Shuai, MA Jian-feng, LI Hong-tao, WANG Chang-guang. Improved data aggregation algorithm based on clustered wireless sensor network [J]. 吉林大学学报(工学版), 2014, 44(4): 1118-1125.
[6] LIU San-min, SUN Zhi-xin. P2P traffic identification based on support vector data description [J]. , 2012, 42(04): 947-951.
[7] ZHANG Rui-Hua, CHENG He-You, JIA Zhi-Beng. Energyefficient clustering algorithm for wireless sensor networks [J]. 吉林大学学报(工学版), 2010, 40(06): 1663-1667.
[8] LIU Yan-Hang, SUN Xin, WANG Jian, LI Wei-Ping, ZHU Jian-Qi. Emailworm propagation with user behavior and network topology [J]. 吉林大学学报(工学版), 2010, 40(06): 1655-1662.
[9] WEI Da, Gu-Xiang-Peng, WANG Jian, Liu-Yan-Hang. New access model and implementation of trusted network based on trusted certificate [J]. 吉林大学学报(工学版), 2010, 40(02): 496-0500.
[10] LIU Yan-Heng, SUN Lei, TIAN Da-Xin, WU Jing. Method of anomaly detection based on fusion principal components match [J]. 吉林大学学报(工学版), 2009, 39(05): 1314-1320.
[11] WANG Xiao-yan,LIU Shu-fen,YU Hai . Interface automata based approach to Web service composition [J]. 吉林大学学报(工学版), 2009, 39(03): 743-0748.
[12] MEI Fang,LIU Yan-heng,ZHANG Xu-li,Gu Tian-ye,WANG Wang . Dynamic conflict resolution mechanism for resource
management policy in mobile network
[J]. 吉林大学学报(工学版), 2009, 39(02): 430-0435.
[13] SUN Zhi-xin, YANG Xi, GONG Jing . New P2P architecture description language [J]. 吉林大学学报(工学版), 2008, 38(05): 1131-1135.
[14] Yang Chao,Cao Chun-jie,Wang Wei,Ma Jian-feng . New authentication protocol of roaming for wireless mesh network [J]. 吉林大学学报(工学版), 2008, 38(02): 423-0428.
[15] Hu De-bin,Wang Jin-ling,Yu Meng-tao,Lin Yu,Hu Liang . ID alias IBE scheme with a trusted third party [J]. 吉林大学学报(工学版), 2008, 38(02): 419-0422.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!