A Practical Attack on Broadcast RC4
From MaRDI portal
Publication:3046601
DOI10.1007/3-540-45473-X_13zbMath1073.68637OpenAlexW2151074078MaRDI QIDQ3046601
Publication date: 12 August 2004
Published in: Fast Software Encryption (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-45473-x_13
Related Items (46)
Proof of Empirical RC4 Biases and New Key Correlations ⋮ Another look at normal approximations in cryptanalysis ⋮ Cryptanalysis of WG-7: a lightweight stream cipher ⋮ Some Proofs of Joint Distributions of Keystream Biases in RC4 ⋮ On the structural weakness of the GGHN stream cipher ⋮ More glimpses of the RC4 internal state array ⋮ How TKIP Induces Biases of Internal States of Generic RC4 ⋮ Resilience to distinguishing attacks on WG-7 cipher and their generalizations ⋮ Finding an internal state of RC4 stream cipher ⋮ RC4: non-randomness in the index \(j\) and some results on its cycles ⋮ Generalization of roos bias in RC4 and some results on key-keystream relations ⋮ Full Plaintext Recovery Attack on Broadcast RC4 ⋮ Further non-randomness in RC4, RC4A and VMPC ⋮ Truncated boomerang attacks and application to AES-based ciphers ⋮ Differential cryptanalysis of Salsa20 based on comprehensive analysis of PNBs ⋮ Revisiting \textit{BoolTest} -- on randomness testing using Boolean functions ⋮ Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs ⋮ Proving the biases of Salsa and ChaCha in differential attack ⋮ New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 ⋮ Efficient Reconstruction of RC4 Keys from Internal States ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ Proving empirical key-correlations in RC4 ⋮ Further clarification on Mantin's digraph repetition bias in RC4 ⋮ On Non-randomness of the Permutation After RC4 Key Scheduling ⋮ The analysis of the number of fixed points in the key extending algorithm of RC4 ⋮ Cryptanalysis of \textit{WG-8} and \textit{WG-16} stream ciphers ⋮ Cryptanalysis of the Full Spritz Stream Cipher ⋮ Proving TLS-attack related open biases of RC4 ⋮ Attack on Broadcast RC4 Revisited ⋮ Revisiting (nested) Roos bias in RC4 key scheduling algorithm ⋮ On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers ⋮ New State Recovery Attack on RC4 ⋮ Glimpses are forever in RC4 amidst the spectre of biases ⋮ Two Trivial Attacks on Trivium ⋮ Permutation After RC4 Key Scheduling Reveals the Secret Key ⋮ Attacks on the RC4 stream cipher ⋮ On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ New Correlations of RC4 PRGA Using Nonzero-Bit Differences ⋮ Settling the mystery of \(Z_{r} = r\) in RC4 ⋮ An overview of distinguishing attacks on stream ciphers ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ New Results on the Key Scheduling Algorithm of RC4
This page was built for publication: A Practical Attack on Broadcast RC4