Attacks on the RC4 stream cipher
From MaRDI portal
Publication:1009047
DOI10.1007/s10623-008-9206-6zbMath1179.94064OpenAlexW2149237395WikidataQ56627260 ScholiaQ56627260MaRDI QIDQ1009047
Publication date: 31 March 2009
Published in: Designs, Codes and Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s10623-008-9206-6
Related Items (22)
Proof of Empirical RC4 Biases and New Key Correlations ⋮ Generalization of roos bias in RC4 and some results on key-keystream relations ⋮ Smashing WEP in a Passive Attack ⋮ Some observations on HC-128 ⋮ New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 ⋮ Efficient Reconstruction of RC4 Keys from Internal States ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ Proving empirical key-correlations in RC4 ⋮ Revisiting (nested) Roos bias in RC4 key scheduling algorithm ⋮ Efficient deterministic and non-deterministic pseudorandom number generation ⋮ Unnamed Item ⋮ A new reversible date-hiding algorithm for encrypted images ⋮ Passive–Only Key Recovery Attacks on RC4 ⋮ Permutation After RC4 Key Scheduling Reveals the Secret Key ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ Settling the mystery of \(Z_{r} = r\) in RC4 ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ New Results on the Key Scheduling Algorithm of RC4 ⋮ Novel way to research nonlinear feedback shift register ⋮ A matrix PRNG with s-box output filtering
Cites Work
This page was built for publication: Attacks on the RC4 stream cipher