Advanced

Towards a general RC4-like keystream generator

Gong, G; Gupta, K C; Hell, Martin LU and Nawaz, Y (2005) Information Security and Cryptology First SKLOIS Conference, CISC 2005 In Information Security and Cryptology / Lecture notes in computer science 3822. p.162-174
Abstract
RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64-bit words but using original RC4 with 32/64 bits is infeasible due to the large memory constraints and the number of operations in the key scheduling algorithm. In this paper we propose a new 32/64-bit RC4-like keystream generator. The proposed generator produces 32 or 64 bits in each iteration and can be implemented in software with reasonable memory requirements. It has a huge internal state and offers higher resistance to state recovery attacks than the original 8-bit RC4. Further, on a 32-bit processor the generator is 3.1 times faster than original RC4. We also show that it can resist attacks that are... (More)
RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64-bit words but using original RC4 with 32/64 bits is infeasible due to the large memory constraints and the number of operations in the key scheduling algorithm. In this paper we propose a new 32/64-bit RC4-like keystream generator. The proposed generator produces 32 or 64 bits in each iteration and can be implemented in software with reasonable memory requirements. It has a huge internal state and offers higher resistance to state recovery attacks than the original 8-bit RC4. Further, on a 32-bit processor the generator is 3.1 times faster than original RC4. We also show that it can resist attacks that are successful on the original RC4. The generator is suitable for high speed software encryption. (Less)
Please use this url to cite or link to this publication:
author
organization
publishing date
type
Chapter in Book/Report/Conference proceeding
publication status
published
subject
keywords
stream ciphers, random shuffle, keystream generator, RC4
in
Information Security and Cryptology / Lecture notes in computer science
volume
3822
pages
162 - 174
publisher
Springer
conference name
Information Security and Cryptology First SKLOIS Conference, CISC 2005
external identifiers
  • wos:000234882000014
  • scopus:33744940833
ISSN
0302-9743
1611-3349
ISBN
978-3-540-30855-3
DOI
10.1007/11599548
language
English
LU publication?
yes
id
46790a66-ef1c-41c7-9890-85a72028e37e (old id 209460)
date added to LUP
2008-02-01 10:50:44
date last changed
2017-11-12 03:32:52
@inproceedings{46790a66-ef1c-41c7-9890-85a72028e37e,
  abstract     = {RC4 was designed in 1987 when 8-bit and 16-bit processors were commercially available. Today, most processors use 32-bit or 64-bit words but using original RC4 with 32/64 bits is infeasible due to the large memory constraints and the number of operations in the key scheduling algorithm. In this paper we propose a new 32/64-bit RC4-like keystream generator. The proposed generator produces 32 or 64 bits in each iteration and can be implemented in software with reasonable memory requirements. It has a huge internal state and offers higher resistance to state recovery attacks than the original 8-bit RC4. Further, on a 32-bit processor the generator is 3.1 times faster than original RC4. We also show that it can resist attacks that are successful on the original RC4. The generator is suitable for high speed software encryption.},
  author       = {Gong, G and Gupta, K C and Hell, Martin and Nawaz, Y},
  booktitle    = {Information Security and Cryptology / Lecture notes in computer science},
  isbn         = {978-3-540-30855-3},
  issn         = {0302-9743},
  keyword      = {stream ciphers,random shuffle,keystream generator,RC4},
  language     = {eng},
  pages        = {162--174},
  publisher    = {Springer},
  title        = {Towards a general RC4-like keystream generator},
  url          = {http://dx.doi.org/10.1007/11599548},
  volume       = {3822},
  year         = {2005},
}