Professional Documents
Culture Documents
• Introduccion
• Secret Key Cryptosystem
• Description
• Source codes of RC4
• RC4 uses OFB
• Pro
• Cons
• Applications
• References
In t r o d u c t io n
RC4 is a stream cipher symmetric key
algorithm. It was developed in 1987 by
Ronald Rivest for RSA Data Security, Inc
[1][2].
[6]
Description
[7]
- RC4 is essentially a pseudo-random number generator initialized
from a secret key of up to 256 bytes.
#!/usr/bin/perl -p
INIT{sub Q{$s[($_[0]+=$_[1])%=256]}sub
S{@s[$y,$x++]=@s[$x,$y]}@k=pop=~/../g;S$y=map{S
Q$y,$_+hex$k[$x%@k]}@s=0..255}s/\C/$&^chr Q S Q$y,Q$x/eg
[6]
Pro
-One in every 256 keys can be a weak key. These keys are
identified by cryptoanalysis that is able to find
circumstances under which one of more generated bytes are
strongly correlated with a few bytes of the key.
[12]
WEP uses RC4
[6]
TKIP uses RC4
[11]
References
[1] ht tp ://w w w .n cat.edu /~g rog an s/algorit hm _ history _ and _ descrip tio.htm
[2] ht tp ://w w w .w isdom .w eizm an n .ac.il/~itsik/RC 4/rc4.htm l
[3] ht tp ://w om b at.d oc.ic.ac.uk/fold oc/fold oc.cg i?RC 4
[4] ht tp ://en .w ikip edia.org /w iki/RC 4_ cip her
[5] “ Old an d N ew A ttacks on RC 4” b y Ily a M iron ov . A p p lied C y p to, Stan d ford
(ily a M iron ov .p p t)
[6] “ Sy m m etric K ey C ry p tog rap hy ” b y Prof . D r.A n d reas Steffen . 2000-2003
Zu rcher H ochschu le Wint erthu r. Sichere N etzw erkkom m u n ikation (SN K ).
10/10/2003. (SN K _ Sy m .p p t)
[7] “ Wireless Secu rity : Prob lem s an d Solut ion s” b y William A A rb au g h. In SA N S
2002 T echn ical C on feren ce Session 1-3. 2002. (1-3_A rb au g h.p d f)
[8] http ://w w w .cy phersp ace.org /ad am /rsa/rc4.htm l
[9] http ://w w w .cr0.n et :8040/cod e/cry p to/rc4/
[10] http ://w w w .sev illaon lin e.com /A ctiv eX /v b 5/RC 4L ib .htm
[11] “ N ext G en eration Wireless L A N Secu rity T echn olog y ” b y Su n n y C han .
C han n el D ev elop m en t Su p p ort M an ag er. http :// w w w .cisco.com
[12] htt p ://w w w .ssh.com
Thank you very much.