Skip to main content

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 202))

Abstract

RC4 is the most widely used stream cipher in many applications. Many Distinguishing Attacks on RC4 system have been published which are based on statistical approaches. These statistical Distinguishing Attacks exploit distribution of bytes, diagraphs and trigraphs in RC4 generated output key stream with respect to random key stream. This paper presents an Artificial Neural Network (ANN) based approach to distinguish RC4 key stream from random key stream. The Joint Mutual Information (JMI) criterion has been used in effective feature selection. The prominent features are used in Back-propagation learning of Multilayer Perceptron (MLP) network to distinguish RC4 system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  • Roos, A.: Class of Weak Keys in the RC4 Stream Cipher. Post in sci.crypt, (1995).

    Google Scholar 

  • Fluhrer, S., Mantin I. and Shamir A.: Weakness in the Key Scheduling Algorithm of RC4, LNCS 2259, 1-24, Springer Verlag (2001).

    Google Scholar 

  • Paul, Souradyuti and Preneel, Bart: A New Weakness in the RC4 Key-stream Generator and an Approach to Improve the Security of the Cipher, FSE-2001, 245-259, Springer Verlag (2004).

    Google Scholar 

  • Mantin, I.: Predicting and Distinguishing Attacks on RC4 Key-stream Generator 491-505, Springer Verlag (2005).

    Google Scholar 

  • Klein, Andreas: Attacks on the RC4 Stream Cipher, Journal of Design, Code and Cryptography, vol 48, issue 3, 269-286, (2008).

    Google Scholar 

  • Yang, H. H. and Moody, J.: Feature Selection based on Joint Mutual Information, Journal of Computational Intelligence Methods and Applications, Int. Computer Science Convention, Vol.13, 1-8, (1999).

    Google Scholar 

  • Brown, G., Pocock, A. and Jhao, M.J.: Conditional Likelihood Maximization: A Unifying Framework for Information Theoretic Feature Selection. Journal of Machine Learning Research, Vol.13, 27-66, (2012).

    Google Scholar 

  • Haykin, S.: Neural Networks- A Comprehensive Foundation, Macmillan, New York, (2001).

    Google Scholar 

  • Katagiri, S.: Hand Book of Neural Networks for Speech Processing, Artech House, London, 1st edition,(2000).

    Google Scholar 

  • www.security.iitk.ac.in/hack.in/2009/bimal_keynote_hack.in.pdf.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ashok K Bhateja .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer India

About this paper

Cite this paper

Bhateja, A.K., Din, M. (2013). ANN Based Distinguishing Attack on RC4 Stream Cipher. In: Bansal, J., Singh, P., Deep, K., Pant, M., Nagar, A. (eds) Proceedings of Seventh International Conference on Bio-Inspired Computing: Theories and Applications (BIC-TA 2012). Advances in Intelligent Systems and Computing, vol 202. Springer, India. https://doi.org/10.1007/978-81-322-1041-2_9

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-1041-2_9

  • Published:

  • Publisher Name: Springer, India

  • Print ISBN: 978-81-322-1040-5

  • Online ISBN: 978-81-322-1041-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics