Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs
From MaRDI portal
Publication:1699264
DOI10.1007/S12095-017-0231-ZzbMATH Open1384.94072OpenAlexW2621461992MaRDI QIDQ1699264FDOQ1699264
Authors: Amit Jana, Goutam Paul
Publication date: 19 February 2018
Published in: Cryptography and Communications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/s12095-017-0231-z
Recommendations
- Novel strategies for searching RC4 key collisions
- Generalized RC4 key collisions and hash collisions
- New collision attacks on round-reduced Keccak
- New Results on the Key Scheduling Algorithm of RC4
- Key Collisions of the RC4 Stream Cipher
- How to find short RC4 colliding key pairs
- New Collision Attacks against Up to 24-Step SHA-2
- New iterated RC4 key correlations
- Efficient Collision Search Attacks on SHA-0
Cites Work
- A Practical Attack on Broadcast RC4
- Techniques for cryptanalysis of block ciphers. (to appear)
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Smashing WEP in a passive attack
- Full plaintext recovery attack on broadcast RC4
- Attack on broadcast RC4 revisited
- New Results on Generalization of Roos-Type Biases and Related Keystreams of RC4
- Plaintext Recovery Attacks Against WPA/TKIP
- New State Recovery Attack on RC4
- Novel strategies for searching RC4 key collisions
- How to find short RC4 colliding key pairs
- Key Collisions of the RC4 Stream Cipher
Cited In (4)
Uses Software
This page was built for publication: Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1699264)