Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
From MaRDI portal
Publication:5504607
DOI10.1007/978-3-540-89754-5_3zbMath1203.94115OpenAlexW2148721465WikidataQ56060511 ScholiaQ56060511MaRDI QIDQ5504607
Publication date: 22 January 2009
Published in: Progress in Cryptology - INDOCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89754-5_3
Related Items (4)
Affine equivalence and non-linearity of permutations over \(\mathbb Z_n\) ⋮ Some Proofs of Joint Distributions of Keystream Biases in RC4 ⋮ Cryptanalysis of the Full Spritz Stream Cipher ⋮ Analysis of burn-in period for RC4 state transition
Uses Software
Cites Work
- Unnamed Item
- Unnamed Item
- Finding an internal state of RC4 stream cipher
- Attacks on the RC4 stream cipher
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- A Practical Attack on Broadcast RC4
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher
- New State Recovery Attack on RC4
- Analysis Methods for (Alleged) RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- On Non-randomness of the Permutation After RC4 Key Scheduling
- Progress in Cryptology - INDOCRYPT 2003
- New Applications of Time Memory Data Tradeoffs
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Fast Software Encryption
- New Results on the Key Scheduling Algorithm of RC4
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
This page was built for publication: Analysis of RC4 and Proposal of Additional Layers for Better Security Margin