Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs
From MaRDI portal
Publication:1699264
DOI10.1007/S12095-017-0231-ZzbMath1384.94072OpenAlexW2621461992MaRDI QIDQ1699264
Publication date: 19 February 2018
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-017-0231-z
Uses Software
Cites Work
- Techniques for cryptanalysis of block ciphers. (to appear)
- Novel strategies for searching RC4 key collisions
- Smashing WEP in a Passive Attack
- Full Plaintext Recovery Attack on Broadcast RC4
- Plaintext Recovery Attacks Against WPA/TKIP
- Attack on Broadcast RC4 Revisited
- A Practical Attack on Broadcast RC4
- How to Find Short RC4 Colliding Key Pairs
- Key Collisions of the RC4 Stream Cipher
- New State Recovery Attack on RC4
- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
This page was built for publication: Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs