A Practical Attack on the Fixed RC4 in the WEP Mode
From MaRDI portal
Publication:5451081
DOI10.1007/11593447_21zbMath1154.94415OpenAlexW1572840940MaRDI QIDQ5451081
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_21
RC4CryptanalysisStream ciphersSide-channel attacksFault analysisRelated IV attacksRelated key attacks
Related Items (18)
Generalization of roos bias in RC4 and some results on key-keystream relations ⋮ A quantum related-key attack based on the Bernstein-Vazirani algorithm ⋮ An ultrafast cryptographically secure pseudorandom number generator ⋮ Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck ⋮ Some observations on HC-128 ⋮ New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ Proving empirical key-correlations in RC4 ⋮ A complete characterization of the evolution of RC4 pseudo random generation algorithm ⋮ On Non-randomness of the Permutation After RC4 Key Scheduling ⋮ Passive–Only Key Recovery Attacks on RC4 ⋮ Permutation After RC4 Key Scheduling Reveals the Secret Key ⋮ On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ Improved BV-based quantum attack on block ciphers
This page was built for publication: A Practical Attack on the Fixed RC4 in the WEP Mode