New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
From MaRDI portal
Publication:3525678
DOI10.1007/978-3-540-71039-4_16zbMath1154.68404OpenAlexW1815744145MaRDI QIDQ3525678
Publication date: 18 September 2008
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-71039-4_16
Related Items (12)
Generalization of roos bias in RC4 and some results on key-keystream relations ⋮ Smashing WEP in a Passive Attack ⋮ Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck ⋮ Some observations on HC-128 ⋮ A complete characterization of the evolution of RC4 pseudo random generation algorithm ⋮ Attack on Broadcast RC4 Revisited ⋮ Revisiting (nested) Roos bias in RC4 key scheduling algorithm ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ Settling the mystery of \(Z_{r} = r\) in RC4 ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ New Results on the Key Scheduling Algorithm of RC4
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attacks on the RC4 stream cipher
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- A Practical Attack on Broadcast RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- On Non-randomness of the Permutation After RC4 Key Scheduling
- Progress in Cryptology - INDOCRYPT 2003
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Fast Software Encryption
This page was built for publication: New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4