(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
From MaRDI portal
Publication:2442647
DOI10.1007/s00145-012-9138-1zbMath1350.94049OpenAlexW2052366538WikidataQ121206449 ScholiaQ121206449MaRDI QIDQ2442647
Santanu Sarkar, Subhamoy Maitra, Sourav Sen Gupta, Goutam Paul
Publication date: 1 April 2014
Published in: Journal of Cryptology (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s00145-012-9138-1
RC4 stream ciphercomplete probability distribution of the first byte of RC4 keystreaminitial-round empirical biaseskeylength on its keystream
Related Items (14)
More glimpses of the RC4 internal state array ⋮ RC4: non-randomness in the index \(j\) and some results on its cycles ⋮ Smashing WEP in a Passive Attack ⋮ Full Plaintext Recovery Attack on Broadcast RC4 ⋮ Proving the biases of Salsa and ChaCha in differential attack ⋮ Further clarification on Mantin's digraph repetition bias in RC4 ⋮ Proving TLS-attack related open biases of RC4 ⋮ Analysis of burn-in period for RC4 state transition ⋮ On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers ⋮ Efficient deterministic and non-deterministic pseudorandom number generation ⋮ Glimpses are forever in RC4 amidst the spectre of biases ⋮ A theoretical investigation on the distinguishers of Salsa and ChaCha ⋮ Settling the mystery of \(Z_{r} = r\) in RC4 ⋮ A matrix PRNG with s-box output filtering
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Finding an internal state of RC4 stream cipher
- Attacks on the RC4 stream cipher
- Proof of Empirical RC4 Biases and New Key Correlations
- Statistical Attack on RC4
- Attack on Broadcast RC4 Revisited
- A Practical Attack on Broadcast RC4
- Discovery and Exploitation of New Biases in RC4
- How to Find Short RC4 Colliding Key Pairs
- Key Collisions of the RC4 Stream Cipher
- Efficient Reconstruction of RC4 Keys from Internal States
- A complete characterization of the evolution of RC4 pseudo random generation algorithm
- New State Recovery Attack on RC4
- On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling
- Analysis Methods for (Alleged) RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Progress in Cryptology - INDOCRYPT 2003
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- On Reconstruction of RC4 Keys from Internal States
- New Results on the Key Scheduling Algorithm of RC4
This page was built for publication: (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher