Paper 2006/070

The experimental distinguishing attack on RC4

Sergey Doroshenko and Boris Ryabko

Abstract

The output of RC4 was analyzed using the "book stack" test for randomness. It is experimentally shown that the keystream generated from RC4 can be distinguished from random with about $2^{32}$ output bits.

Metadata
Available format(s)
PDF
Category
Secret-key cryptography
Publication info
Published elsewhere. Unknown where it was published
Keywords
stream ciphers
Contact author(s)
boris @ ryabko net
History
2006-02-23: received
Short URL
https://ia.cr/2006/070
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2006/070,
      author = {Sergey Doroshenko and Boris Ryabko},
      title = {The experimental distinguishing attack on RC4},
      howpublished = {Cryptology ePrint Archive, Paper 2006/070},
      year = {2006},
      note = {\url{https://eprint.iacr.org/2006/070}},
      url = {https://eprint.iacr.org/2006/070}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.