CFP last date
20 December 2024
Reseach Article

Deep Learning based Analysis of Stream Ciphers A5/1 and RC4

by Aryan Prajapati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 185 - Number 28
Year of Publication: 2023
Authors: Aryan Prajapati
10.5120/ijca2023923028

Aryan Prajapati . Deep Learning based Analysis of Stream Ciphers A5/1 and RC4. International Journal of Computer Applications. 185, 28 ( Aug 2023), 12-18. DOI=10.5120/ijca2023923028

@article{ 10.5120/ijca2023923028,
author = { Aryan Prajapati },
title = { Deep Learning based Analysis of Stream Ciphers A5/1 and RC4 },
journal = { International Journal of Computer Applications },
issue_date = { Aug 2023 },
volume = { 185 },
number = { 28 },
month = { Aug },
year = { 2023 },
issn = { 0975-8887 },
pages = { 12-18 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume185/number28/32867-2023923028/ },
doi = { 10.5120/ijca2023923028 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:27:16.109625+05:30
%A Aryan Prajapati
%T Deep Learning based Analysis of Stream Ciphers A5/1 and RC4
%J International Journal of Computer Applications
%@ 0975-8887
%V 185
%N 28
%P 12-18
%D 2023
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, we present the analysis of stream ciphers by using deep learning methods to detect and expose their vulnerability. For this, A5/1 and RC4 stream ciphers are chosen as they both are popular and known to have several security vulnerabilities. In this paper, these vulnerabilities are exposed in the form of ‘bias’ detection using the deep learning methodology.

References
  1. Ross Anderson (17 June 1994). "A5 (Was: HACKING DIGITAL PHONES)".
  2. J. Golic, “Cryptanalysis of an alleged A5 stream cipher,” Advances in Cryptology. EUROCRYPT97. LNCS, Vol. 1233, 1997, pp. 239-255, Springer-Verlag
  3. Biryukov, Alex; Adi Shamir; David Wagner. "Real Time Cryptanalysis of A5/1 on a PC". Fast Software Encryption—FSE 2000: 1–18.
  4. Patrik E., Thomas J. (2002) “Another Attack on A5/1” citeseerx library, pages (284-289)
  5. Maximov, Alexander; Thomas Johansson; Steve Babbage (2004). "An Improved Correlation Attack on A5/1". Selected Areas in Cryptography 2004: 1–18.
  6. Barkan, E., Biham, E., and Keller, N., Instant Ciphertext-only Cryptanalysis of GSM Encrypted Communication, Technical Report CS-2006-07, Technion, 2006.
  7. Goutam Paul, Siddheshwar Rathi, and Subhamoy Maitra. On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. Proceedings of the International Workshop on Coding and Cryptography (WCC) 2007, pages 285–294.
  8. Andrew Roos. A Class of Weak Keys in the RC4 Stream Cipher (1995).
  9. Itsik Mantin, Adi Shamir (2001). A Practical Attack on Broadcast RC4, FSE 2001. pp. 152–164
  10. Fluhrer, Scott R.; Mantin, Itsik; Shamir, Adi (2001). "Weaknesses in the Key Scheduling Algorithm of RC4", pp 1 -24.
  11. Erik Tews, Ralf-Philipp Weinmann, Andrei Pyshkin.” Breaking 104-bit WEP in under a minute”.
  12. A. Klein, Attacks on the RC4 stream cipher, Designs, Codes and Cryptography (2008) 48:269–286.
  13. Al Fardan; et al. (8 July 2013). "On the Security of RC4 in TLS and WPA", Information Security Group, Royal Holloway, University of London.
  14. "On the Security of RC4 in TLS and WPA", Information Security Group, Royal Holloway, University of London, Retrieved 6 September 2013.
  15. Mathy Vanhoef and Frank Piessens (9 August 2015). "RC4 NOMORE: Numerous Occurrence Monitoring & Recovery Exploit"
  16. Marc Briceno, Ian Goldberg, and David Wagner (1998-1999), "A pedagogical implementation of A5/1", featured in cryptome.org/jya/a51-pi.htm#PI
  17. Basu, Riddhipratim; Ganguly, Shirshendu; Maitra, Subhamoy; Paul, Goutam (2008). "A Complete Characterization of the Evolution of RC4 Pseudo Random Generation Algorithm". Journal of Mathematical Cryptology.
  18. RC4: Test Vectors, https://en.wikipedia.org/wiki/RC4, // last accesed on 22 Jan 2023.
  19. NIST SP 800-22, A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications, random number generator, hypothesis test, P-value, by NIST Computer Security Division (CSD) (In 2010).
Index Terms

Computer Science
Information Sciences

Keywords

Cryptanalysis Stream cipher Symmetric stream cipher A5/1 RC4 Deep Learning Dense Neural Network.