Goutam Paul, Subhamoy Maitra
Published November 16, 2011
Reference - 311 Pages - 12 B/W Illustrations
ISBN 9781439831359 - CAT# K11529
Series: Discrete Mathematics and Its Applications
For Instructors Request Inspection Copy
For Librarians Available on Taylor & Francis eBooks >>
SAVE ~$21.00 on each
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128.
After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4. It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values. The text explains how to reconstruct the secret key from known state information and analyzes the RC4 PRGA in detail, including a sketch of state recovery attacks. The book then describes three popular attacks on RC4: distinguishing attacks, Wired Equivalent Privacy (WEP) protocol attacks, and fault attacks. The authors also compare the advantages and disadvantages of several variants of RC4 and examine stream cipher HC-128, which is the next level of evolution after RC4 in the software stream cipher paradigm. The final chapter emphasizes the safe use of RC4.
With open research problems in each chapter, this book offers a complete account of the most current research on RC4.
Introduction to Cryptography
Etymology and Some Historical Facts
Primary Goals of Cryptography
Cryptographic Attack Models
Private and Public Key Cryptosystems
Stream Ciphers and RC4
Analysis of Key Scheduling
Key Recovery from State Information
Analysis of Keystream Generation
A Theoretical Framework of Distinguishing Attacks
Distinguishers Based on Initial Keystream Bytes
Distinguishers Based on Any Stage of PRGA
WEP and WPA Attacks
Hoch and Shamir’s Attack
Impossible and Differential Fault Attacks
Fault Attack Based on Fork Model
Fault Attack with Pseudo-Random Index Stuck
Variants of RC4
Stream Cipher HC-128
Description of HC-128
Linear Approximation of Feedback Functions
Distinguishing Attacks on HC-128
Collisions in h1, h2 and State Leakage in Keystream
Constructing Full-State Given Only Half-State Information
Design Modification with Respect to Known Observations
Appendix A: A Sample C Implementation of RC4
Appendix B: Verified Test Vectors of RC4
Research Problems are presented at the end of chapters 3-10.
"This remarkable monograph is ‘the first one on RC4.’ The theory surrounding the development of RC4 is very helpful for the study of stream ciphers in general, as the authors say. The book will be of interest to scholars and students whose expertise lies in cryptography, applied mathematics, computer security, and so on."
—Zhixiong Chen, Mathematical Reviews, January 2013
"I am delighted to introduce the first complete book on RC4, the most popular and widely deployed software stream cipher. … This book contains not only the authors’ own research materials, but it has nicely assimilated the results of others to make it a complete treatise on RC4 and its variants. I believe this book will be widely accepted as an important research monograph by both the students and experienced researchers in the field of cryptology."
—From the Foreword by Bimal Roy, founder of the Cryptology Research Society of India and director of the Indian Statistical Institute