A Practical Attack on Broadcast RC4

From MaRDI portal
Publication:3046601


DOI10.1007/3-540-45473-X_13zbMath1073.68637OpenAlexW2151074078MaRDI QIDQ3046601

Adi Shamir, Itsik Mantin

Publication date: 12 August 2004

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-45473-x_13



Related Items

Proof of Empirical RC4 Biases and New Key Correlations, Another look at normal approximations in cryptanalysis, Cryptanalysis of WG-7: a lightweight stream cipher, Some Proofs of Joint Distributions of Keystream Biases in RC4, On the structural weakness of the GGHN stream cipher, More glimpses of the RC4 internal state array, How TKIP Induces Biases of Internal States of Generic RC4, Resilience to distinguishing attacks on WG-7 cipher and their generalizations, Finding an internal state of RC4 stream cipher, RC4: non-randomness in the index \(j\) and some results on its cycles, Generalization of roos bias in RC4 and some results on key-keystream relations, Full Plaintext Recovery Attack on Broadcast RC4, Further non-randomness in RC4, RC4A and VMPC, Truncated boomerang attacks and application to AES-based ciphers, Differential cryptanalysis of Salsa20 based on comprehensive analysis of PNBs, Revisiting \textit{BoolTest} -- on randomness testing using Boolean functions, Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs, Proving the biases of Salsa and ChaCha in differential attack, New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4, Efficient Reconstruction of RC4 Keys from Internal States, (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher, Proving empirical key-correlations in RC4, Further clarification on Mantin's digraph repetition bias in RC4, On Non-randomness of the Permutation After RC4 Key Scheduling, The analysis of the number of fixed points in the key extending algorithm of RC4, Cryptanalysis of \textit{WG-8} and \textit{WG-16} stream ciphers, Cryptanalysis of the Full Spritz Stream Cipher, Proving TLS-attack related open biases of RC4, Attack on Broadcast RC4 Revisited, Revisiting (nested) Roos bias in RC4 key scheduling algorithm, On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers, New State Recovery Attack on RC4, Glimpses are forever in RC4 amidst the spectre of biases, Two Trivial Attacks on Trivium, Permutation After RC4 Key Scheduling Reveals the Secret Key, Attacks on the RC4 stream cipher, On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key, Discovery and Exploitation of New Biases in RC4, New Correlations of RC4 PRGA Using Nonzero-Bit Differences, Settling the mystery of \(Z_{r} = r\) in RC4, An overview of distinguishing attacks on stream ciphers, On biases of permutation and keystream bytes of RC4 towards the secret key, A new distinguishing and key recovery attack on NGG stream cipher, New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B, Analysis of RC4 and Proposal of Additional Layers for Better Security Margin, New Results on the Key Scheduling Algorithm of RC4