Discovery and Exploitation of New Biases in RC4
From MaRDI portal
Publication:3084245
DOI10.1007/978-3-642-19574-7_5zbMath1290.94128OpenAlexW1835780626WikidataQ55878133 ScholiaQ55878133MaRDI QIDQ3084245
Martin Vuagnoux, Serge Vaudenay, Pouyan Sepehrdad
Publication date: 15 March 2011
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-19574-7_5
Related Items (15)
On the effectiveness of time travel to inject COVID-19 alerts ⋮ Proof of Empirical RC4 Biases and New Key Correlations ⋮ Novel strategies for searching RC4 key collisions ⋮ Synthetic linear analysis with applications to CubeHash and Rabbit ⋮ RC4: non-randomness in the index \(j\) and some results on its cycles ⋮ Generalization of roos bias in RC4 and some results on key-keystream relations ⋮ Smashing WEP in a Passive Attack ⋮ Full Plaintext Recovery Attack on Broadcast RC4 ⋮ Further non-randomness in RC4, RC4A and VMPC ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ Proving empirical key-correlations in RC4 ⋮ Proving TLS-attack related open biases of RC4 ⋮ Attack on Broadcast RC4 Revisited ⋮ How to Find Short RC4 Colliding Key Pairs ⋮ Settling the mystery of \(Z_{r} = r\) in RC4
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Finding an internal state of RC4 stream cipher
- Attacks on the RC4 stream cipher
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- A Practical Attack on Broadcast RC4
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- New State Recovery Attack on RC4
- Analysis Methods for (Alleged) RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Fast Software Encryption
- Fast Software Encryption
This page was built for publication: Discovery and Exploitation of New Biases in RC4