Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
From MaRDI portal
Publication:3511172
DOI10.1007/978-3-540-70500-0_23zbMath1285.94080OpenAlexW1540316525MaRDI QIDQ3511172
Publication date: 8 July 2008
Published in: Information Security and Privacy (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-70500-0_23
Cites Work
- Finding an internal state of RC4 stream cipher
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- New State Recovery Attack on RC4
- Analysis Methods for (Alleged) RC4
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Fast Software Encryption
This page was built for publication: Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck