Professional Documents
Culture Documents
Agenda: Introduction To RC4 RC4 Algorithm Cryptanalysis On RC4 Future Work
Agenda: Introduction To RC4 RC4 Algorithm Cryptanalysis On RC4 Future Work
●Introduction to RC4
●RC4 algorithm
●Cryptanalysis on RC4
- WEP Attack
●Future work
INTRODUCTION
●KSA
For i= 0 to N do
S[ i ]=i;
T[ i ] =k [ i mod keylen ]
J=0;
For i = 0 to N do
j=( j + s[ i ] + t [ i ] ) mod N
Swap (S[ i],S[j])
Algorithm contd…..
●PRGN :--
i=0
j=0
i= ( i+1 ) mod N
j= (j+ S[i] ) mod N
Swap ( S[i] , S[j] )
T=( S[i]+S[j] ) mod N
K= S[t]
Applications of RC4
WEP Encryption :-
Plainte
● ICV = Integrity Check
xt
Message ICV Value (CRC-32)
IV = Initialisation Vector
Keystream=RC4(IV, key) (plaintext) [24 bit]
WEP Decryption :-
Received Data
IV Ciphertext
XOR
Keystream=RC4(IV, key)
Message ICV
decrypted message
WEP Cryptanalytic Attack
○…as K0,K1,K2,K3,K4,K5,...