Abstract
RC4 is the most widely used stream cipher in many applications. Many Distinguishing Attacks on RC4 system have been published which are based on statistical approaches. These statistical Distinguishing Attacks exploit distribution of bytes, diagraphs and trigraphs in RC4 generated output key stream with respect to random key stream. This paper presents an Artificial Neural Network (ANN) based approach to distinguish RC4 key stream from random key stream. The Joint Mutual Information (JMI) criterion has been used in effective feature selection. The prominent features are used in Back-propagation learning of Multilayer Perceptron (MLP) network to distinguish RC4 system.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Roos, A.: Class of Weak Keys in the RC4 Stream Cipher. Post in sci.crypt, (1995).
Fluhrer, S., Mantin I. and Shamir A.: Weakness in the Key Scheduling Algorithm of RC4, LNCS 2259, 1-24, Springer Verlag (2001).
Paul, Souradyuti and Preneel, Bart: A New Weakness in the RC4 Key-stream Generator and an Approach to Improve the Security of the Cipher, FSE-2001, 245-259, Springer Verlag (2004).
Mantin, I.: Predicting and Distinguishing Attacks on RC4 Key-stream Generator 491-505, Springer Verlag (2005).
Klein, Andreas: Attacks on the RC4 Stream Cipher, Journal of Design, Code and Cryptography, vol 48, issue 3, 269-286, (2008).
Yang, H. H. and Moody, J.: Feature Selection based on Joint Mutual Information, Journal of Computational Intelligence Methods and Applications, Int. Computer Science Convention, Vol.13, 1-8, (1999).
Brown, G., Pocock, A. and Jhao, M.J.: Conditional Likelihood Maximization: A Unifying Framework for Information Theoretic Feature Selection. Journal of Machine Learning Research, Vol.13, 27-66, (2012).
Haykin, S.: Neural Networks- A Comprehensive Foundation, Macmillan, New York, (2001).
Katagiri, S.: Hand Book of Neural Networks for Speech Processing, Artech House, London, 1st edition,(2000).
www.security.iitk.ac.in/hack.in/2009/bimal_keynote_hack.in.pdf.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer India
About this paper
Cite this paper
Bhateja, A.K., Din, M. (2013). ANN Based Distinguishing Attack on RC4 Stream Cipher. In: Bansal, J., Singh, P., Deep, K., Pant, M., Nagar, A. (eds) Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012). Advances in Intelligent Systems and Computing, vol 202. Springer, India. https://doi.org/10.1007/978-81-322-1041-2_9
Download citation
DOI: https://doi.org/10.1007/978-81-322-1041-2_9
Published:
Publisher Name: Springer, India
Print ISBN: 978-81-322-1040-5
Online ISBN: 978-81-322-1041-2
eBook Packages: EngineeringEngineering (R0)