A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48)

Ali Movaghar, Mohsen HajSalehi Sichani

2009

Abstract

This paper combines the cryptanalysis of RC4 and Data mining algorithm. It analyzes RC4 by Data mining algorithm (J48) for the first time and discloses more vulnerabilities of RC4. The motivation for this paper is combining Artificial Intelligence and Machine learning with cryptography to decrypt cyphertext in the shortest possible time. This analysis shows that lots of numbers in RC4 during different permutations and substitutions do not change their positions and are fixed in their places. This means KSA and PRGA are bad shuffle algorithms. In this method, the information theory and Decision trees are used which are very powerful for solving hard problems and extracting information from data. The results of this Data mining approach could be used to improve the existing methods of breaking WEP (or other encryption algorithms) in less time with fewer packets.

References

  1. E. Tews, R. W. and Pyshkin, A. (2007). Breaking 104 bit wep in less than 60 seconds. Cryptology ePrint. Available at http://eprint.iacr.org/2007/120.pdf.
  2. Erickson, J. (2008). Hacking: The Art of Exploitation. No Starch Publication, San Francisco, CA, 2nd edition.
  3. Finney, H. (1994). An rc4 cycle that can't happen. sci.crypt newsgroup.
  4. J. Hakkila, T. Giblin, D. J. H. R. J. R. and Paciesas, W. (2009). J48 decision trees. Retrieved February 4, 2009 from http://grb.mnsu.edu/ grbts/doc/manual/J48 Decision Trees.html.
  5. Kantardzic, M. (2003). Data Mining: Concepts, Models, Methods, and Algorithms. John Wiley & Sons.
  6. Klein, A. (2007). Attacks on the rc4 stream cipher. Springer Netherlands: Designs, Codes and Cryptography, 48(3).
  7. Mironov, I. (2002). Not (so) random shuffle of rc4. Crypto 2002 (M. Yung, ed.), 2442 of LNCS:304-319.
  8. S. R. Fluhrer, I. M. and Shamir, A. (2001). Weaknesses in the key scheduling algorithm of rc4. Eighth Annual Workshop on Selected Areas in Cryptography (SAC). Available at http://www.securitytechnet.com/crypto/algorithm/ block.html.
  9. Shannon, C. (1984). A mathematical theory of communication. Bell System Technical, 27:379-423 and 623-656.
  10. Shannon, C. and Weaver, W. (1949). The Mathematical Theory of Communication. IL: University of ILLinois Press.
  11. Witten, I. H. and Frank, E. (2005). DATA MINING : Practical machine learning tools and techniques. Morgan Kaufmann series in data management systems, UNITED STATES OF AMERICA, 2nd edition.
  12. Wu, S. L. and Tseng, Y., editors (2007). Wireless ad hoc networking: personal area, local area, and the sensory area networks. Auerbach Publications, New York.
Download


Paper Citation


in Harvard Style

Movaghar A. and HajSalehi Sichani M. (2009). A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48) . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 213-218. DOI: 10.5220/0002183602130218


in Bibtex Style

@conference{secrypt09,
author={Ali Movaghar and Mohsen HajSalehi Sichani},
title={A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48)},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={213-218},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002183602130218},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48)
SN - 978-989-674-005-4
AU - Movaghar A.
AU - HajSalehi Sichani M.
PY - 2009
SP - 213
EP - 218
DO - 10.5220/0002183602130218