On Non-randomness of the Permutation After RC4 Key Scheduling
From MaRDI portal
Publication:5386083
DOI10.1007/978-3-540-77224-8_14zbMath1195.94068OpenAlexW1574177515MaRDI QIDQ5386083
Goutam Paul, Rohit Srivastava, Subhamoy Maitra
Publication date: 17 April 2008
Published in: Applied Algebra, Algebraic Algorithms and Error-Correcting Codes (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77224-8_14
Related Items (6)
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 ⋮ Proving TLS-attack related open biases of RC4 ⋮ Analysis of burn-in period for RC4 state transition ⋮ New Correlations of RC4 PRGA Using Nonzero-Bit Differences ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Cites Work
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- A Practical Attack on Broadcast RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Fast Software Encryption
- Unnamed Item
- Unnamed Item
- Unnamed Item
This page was built for publication: On Non-randomness of the Permutation After RC4 Key Scheduling