• Search Research Projects
  • Search Researchers
  • How to Use
  1. Back to previous page

On the anaysis of stream cipher and its implementation

Research Project

Project/Area Number 23560455
Research Category

Grant-in-Aid for Scientific Research (C)

Allocation TypeMulti-year Fund
Section一般
Research Field Communication/Network engineering
Research InstitutionKobe University

Principal Investigator

MORII Masakatu  神戸大学, 工学(系)研究科(研究院), 教授 (00220038)

Project Period (FY) 2011 – 2013
Project Status Completed (Fiscal Year 2013)
Budget Amount *help
¥5,200,000 (Direct Cost: ¥4,000,000、Indirect Cost: ¥1,200,000)
Fiscal Year 2013: ¥1,430,000 (Direct Cost: ¥1,100,000、Indirect Cost: ¥330,000)
Fiscal Year 2012: ¥1,300,000 (Direct Cost: ¥1,000,000、Indirect Cost: ¥300,000)
Fiscal Year 2011: ¥2,470,000 (Direct Cost: ¥1,900,000、Indirect Cost: ¥570,000)
Keywordsストリーム暗号 / 解読 / 無線LAN / RC4 / WEP / WPA-TKIP / SSL-TLS / 脆弱性 / WPA/TKIP / WPA/-TKIP
Research Abstract

Stream cipher is a widely-used in secured protocols. Especially, RC4 is adopted in a lot of standard protocols such as WEP, WPA and SSL/TLS as a standard encryption algorithm. We present the evaluation of these protocols based on the stream cipher. Firstly, we proposed practical plaintext recovery attacks on RC4 in SSL/TLS in the broadcast setting, independently. We give an active attack, which is a method to slide the position of a target plaintext byte into later byte of the plaintext. Our attack injects any bytes into the head of the plaintext by using malicious JavaScript. It causes improvement in probability for recovering a lot of plaintext bytes. Secondly, we propose a secure WEP operation against key recovery attacks. The proposed method requires for attackers at least 100,000 packets to recover the WEP key. At last, we propose an executable attack in a real environment without requiring the man-in-the-middle attack on WPA-TKIP.

Report

(4 results)
  • 2013 Annual Research Report   Final Research Report ( PDF )
  • 2012 Research-status Report
  • 2011 Research-status Report
  • Research Products

    (39 results)

All 2014 2013 2012 2011

All Journal Article (18 results) (of which Peer Reviewed: 18 results) Presentation (21 results) (of which Invited: 1 results)

  • [Journal Article] Comprehensive Analysis of Initial Keystream Biases of RC42014

    • Author(s)
      Takanori Isobe,Toshihiro Ohigashi,Yuhei Watanabe,Masakatu Morii
    • Journal Title

      IEICE Trans.Fundamentals

      Volume: vol.EA97 A Pages: 139-151

    • NAID

      130003385338

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Comprehensive Analysis of Initial Keystream Biases of RC42014

    • Author(s)
      Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, Masakatu Morii
    • Journal Title

      IEICE Trans. Fundamentals

      Volume: EA97-A Pages: 139-151

    • NAID

      130003385338

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Full Plaintext Recovery Attack on Broadcast RC42013

    • Author(s)
      Takanori Isobe,Toshihiro Ohigashi,Yuhei Watanabe,and Masakatu Morii
    • Journal Title

      20th Int.Workshop on Fast Software Encryption (FSE2013)

      Volume: LNCS,Springer Verlag Pages: 1-18

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack2013

    • Author(s)
      Takanori Isobe,Toshihiro Ohigashi,Masakatu Morii
    • Journal Title

      Journal of information processing

      Volume: vol.21 Pages: 599-606

    • NAID

      130003384069

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Slide Property of RAKAPOSHI and Its Application to Key Recovery Attack2013

    • Author(s)
      Takanori Isobe , Toshihiro Ohigashi , Masakatu Morii
    • Journal Title

      ournal of information processing

      Volume: 21 Pages: 599-606

    • NAID

      130003384069

    • Related Report
      2013 Annual Research Report
    • Peer Reviewed
  • [Journal Article] Full Plaintext Recovery Attack on Broadcast RC42013

    • Author(s)
      Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, and Masakatu Morii
    • Journal Title

      20th Int. Workshop on Fast Software Encryption (FSE2013), LNCS

      Volume: 1 Pages: 118-118

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation2012

    • Author(s)
      Tsubasa Tsukaune,Yosuke Todo,and Masakatu Morii
    • Journal Title

      Proc.AsiaJCIS2012

      Volume: vol.1 Pages: 1-6

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI2012

    • Author(s)
      Takanori Isobe,Toshihiro Ohigashi,and Masakatu Morii
    • Journal Title

      The 7th Int.Workshop on Security (IWSEC2012)

      Volume: LNCS 7631,Springer Verlag Pages: 138-155

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Proposal of a Secure WEP Operation against Existing Key Recovery Attacks and its Evaluation2012

    • Author(s)
      Tsubasa Tsukaune, Yosuke Todo, and Masakatu Morii
    • Journal Title

      Proc. AsiaJCIS2012

      Volume: 1 Pages: 16-16

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI2012

    • Author(s)
      Takanori Isobe, Toshihiro Ohigashi, and Masakatu Mori
    • Journal Title

      The 7th Int. Workshop on Security (IWSEC2012), LNCS 7631, Springer-Verlag

      Volume: 1 Pages: 138155-138155

    • Related Report
      2012 Research-status Report
    • Peer Reviewed
  • [Journal Article] Falsification attacks against WPA-TKIP in a realistic environment2012

    • Author(s)
      Yosuke Todo, Yuki Ozawa, Toshihiro Ohigashi, Masakatu Morii
    • Journal Title

      IEICE Trans. Information and Systems

      Volume: E95-D Pages: 1745-1361

    • NAID

      10030611159

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] Authentication Scheme with User Anonymity Based on Three Party Structure for Wireless Environments2011

    • Author(s)
      Ryoichi Isawa and Masakatu Morii
    • Journal Title

      Proceedings of The 6th Joint Workshop on Information Security (JWIS2011)

      Volume: vol.1 Pages: 1-8

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] AES Flow Interception : Key Snooping Method on Virtual Machine Exception Handling Attack for AES NI2011

    • Author(s)
      Tatsuya Takehisa,Hiroki Nogawa,and Masakatu Morii
    • Journal Title

      The 6th Joint Workshop on Information Security (JWIS2011)

      Volume: vol.1 Pages: 9-16

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis for RC4 and breaking WEP/WPA TKIP2011

    • Author(s)
      Masakatu Morii and Yosuke Todo
    • Journal Title

      IEICE Trans.Information and Systems

      Volume: vol.E94 D Pages: 2087-2094

    • NAID

      10030193717

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Falsification attacks against WPA TKIP in a realistic environment2011

    • Author(s)
      Yosuke Todo,Yuki Ozawa,Toshihiro Ohigashi,and Masakatu Morii
    • Journal Title

      IEICE Trans.on Information and Systems

      Volume: vol.E95 D Pages: 588-595

    • NAID

      10030611159

    • Related Report
      2013 Final Research Report
    • Peer Reviewed
  • [Journal Article] Authentication Scheme with User Anonymity Based on Three Party Structure for Wireless Environments2011

    • Author(s)
      Ryoichi Isawa, Masakatu Morii
    • Journal Title

      Proceeding of The 6th Joint Workshop on Information Security

      Volume: 1 Pages: 1-8

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] AES Flow Interception: Key Snooping Method on Virtual Machine - Exception Handling Attack for AES-NI -2011

    • Author(s)
      Tatsuya Takehisa, Hiroki Nogawa, Masakatu Morii
    • Journal Title

      Proceeding of The 6th Joint Workshop on Information Security

      Volume: 1 Pages: 9-16

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Journal Article] Cryptanalysis for RC4 and breaking WEP/WPA-TKIP2011

    • Author(s)
      Masakatu Morii, Yosuke Todo
    • Journal Title

      IEICE Trans. Information and Systems

      Volume: E94-D Pages: 2087-2094

    • NAID

      10030193717

    • Related Report
      2011 Research-status Report
    • Peer Reviewed
  • [Presentation] WEPにおけるStrong IVの評価とその実装2014

    • Author(s)
      入山敬大,渡辺優平,森井昌克
    • Organizer
      SCIS2014
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Final Research Report
  • [Presentation] SSL/TLSでのRC4に対する平文回復攻撃の改良2014

    • Author(s)
      渡辺優平,森井昌克
    • Organizer
      SCIS2014
    • Place of Presentation
      鹿児島
    • Related Report
      2013 Final Research Report
  • [Presentation] SSL/TLSのRC4へのActive Attack2014

    • Author(s)
      大東俊博,五十部孝典,渡辺優平,野島良,森井昌克
    • Organizer
      信学技法
    • Place of Presentation
      名護(ICSS)
    • Related Report
      2013 Final Research Report
  • [Presentation] WEPにおけるStrong IVの評価とその実装2014

    • Author(s)
      入山 敬大, 渡辺 優平, 森井昌克
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島市)
    • Related Report
      2013 Annual Research Report
  • [Presentation] SSL/TLSでのRC4に対する平文回復攻撃の改良2014

    • Author(s)
      渡辺 優平, 森井昌克
    • Organizer
      暗号と情報セキュリティシンポジウム(SCIS2014)
    • Place of Presentation
      城山観光ホテル(鹿児島市)
    • Related Report
      2013 Annual Research Report
  • [Presentation] SSL/TLSのRC4へのActive Attack2014

    • Author(s)
      大東俊博, 五十部孝典, 渡辺優平, 野島良, 森井昌克
    • Organizer
      電子情報通信学会情報通信システムセキュリティ研究会
    • Place of Presentation
      名桜大学(名護市、沖縄)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Expanding Weak Key Space of RC42013

    • Author(s)
      Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, and Masakatu Morii
    • Organizer
      SCIS2013
    • Place of Presentation
      Kyoto
    • Related Report
      2013 Final Research Report
  • [Presentation] New Biases of RC4 and its Application to Disitingushing, Key Recovery, Plaintext Recovery Attacks2013

    • Author(s)
      Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, and Masakatu Morii
    • Organizer
      SCIS2013
    • Place of Presentation
      Kyoto
    • Related Report
      2013 Final Research Report
  • [Presentation] 高速WEP解読法2013

    • Author(s)
      飯塚大貴,渡辺優平,長尾篤,森井昌克
    • Organizer
      コンピュータセキュリティシンポジウム(CSS2013)
    • Place of Presentation
      高松
    • Related Report
      2013 Final Research Report
  • [Presentation] Vulnerability of RC4 in SSL/TLS2013

    • Author(s)
      Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, Masakatu Morii
    • Organizer
      電子情報通信学会情報通信システムセキュリティ研究会
    • Place of Presentation
      アオーレ長岡
    • Related Report
      2013 Annual Research Report
  • [Presentation] 高速WEP解読法2013

    • Author(s)
      飯塚大貴, 渡辺優平, 長尾篤, 森井昌克
    • Organizer
      コンピュータセキュリティシンポジウム(CSS2013)
    • Place of Presentation
      かがわ国際会議場(高松市)
    • Related Report
      2013 Annual Research Report
  • [Presentation] Expanding Weak-Key Space of RC42013

    • Author(s)
      Atsushi Nagao, Toshihiro Ohigashi, Takanori Isobe, and Masakatu Morii
    • Organizer
      SCIS2013
    • Place of Presentation
      ウェスティン都ホテル京都
    • Related Report
      2012 Research-status Report
  • [Presentation] Plaintext Recovery Attack for High-density Knapsack Cryptography2013

    • Author(s)
      Atsushi Nagao, Homere Faivre, Tristan Hascoet, Ryo Hirano, Masakatu Morii
    • Organizer
      SCIS2013
    • Place of Presentation
      ウェスティン都ホテル京都
    • Related Report
      2012 Research-status Report
  • [Presentation] New Biases of RC4 and its Application to Disitingushing, Key Recovery, Plaintext Recovery Attacks2013

    • Author(s)
      Yuhei Watanabe, Takanori Isobe, Toshihiro Ohigashi, and Masakatu Morii
    • Organizer
      SCIS2013
    • Place of Presentation
      ウェスティン都ホテル京都
    • Related Report
      2012 Research-status Report
  • [Presentation] How to Recover Full Plaintext from Only Ciphertexts on Broadcast RC42013

    • Author(s)
      Toshihiro Ohigashi, Takanori Isobe, Yuhei Watanabe, and Masakatu Morii
    • Organizer
      SCIS2013
    • Place of Presentation
      ウェスティン都ホテル京都
    • Related Report
      2012 Research-status Report
  • [Presentation] How to break WEP/WPA-TKIP; Attack on RC4 and other stream ciphers2012

    • Author(s)
      Masakatu Morii
    • Organizer
      AsiaJCIS2013
    • Place of Presentation
      Tokai Univ., Japan
    • Related Report
      2013 Final Research Report
  • [Presentation] How to break WEP/WPA-TKIP; Attacks on RC4 and other stream ciphers2012

    • Author(s)
      Masakatsu Morii
    • Organizer
      AsiaJCIS2012
    • Place of Presentation
      Tokai University, Japan
    • Related Report
      2012 Research-status Report
    • Invited
  • [Presentation] 既存鍵回復攻撃を無効にするWEP運用の提案2011

    • Author(s)
      塚畝翼,藤堂洋介,森井昌克
    • Organizer
      信学技報
    • Place of Presentation
      松山(LOIS)
    • Related Report
      2013 Final Research Report
  • [Presentation] 既存鍵回復攻撃を困難にするWEPの運用とその評価2011

    • Author(s)
      塚畝翼,藤堂洋介,森井昌克
    • Organizer
      信学技報
    • Place of Presentation
      大阪(ISEC)
    • Related Report
      2013 Final Research Report
  • [Presentation] 既存鍵回復攻撃を無効にするWEP運用の提案2011

    • Author(s)
      塚畝翼, 藤堂洋介, 森井昌克
    • Organizer
      信学技報LOIS
    • Place of Presentation
      松山
    • Related Report
      2011 Research-status Report
  • [Presentation] 既存鍵回復攻撃を困難にするWEPの運用とその評価2011

    • Author(s)
      塚畝翼, 藤堂洋介, 森井昌克
    • Organizer
      信学技報ISEC
    • Place of Presentation
      大阪
    • Related Report
      2011 Research-status Report

URL: 

Published: 2011-08-05   Modified: 2019-07-29  

Information User Guide FAQ News Terms of Use Attribution of KAKENHI

Powered by NII kakenhi