A Practical Attack on Broadcast RC4

From MaRDI portal
Publication:3046601

DOI10.1007/3-540-45473-X_13zbMath1073.68637OpenAlexW2151074078MaRDI QIDQ3046601

Adi Shamir, Itsik Mantin

Publication date: 12 August 2004

Published in: Fast Software Encryption (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/3-540-45473-x_13




Related Items (46)

Proof of Empirical RC4 Biases and New Key CorrelationsAnother look at normal approximations in cryptanalysisCryptanalysis of WG-7: a lightweight stream cipherSome Proofs of Joint Distributions of Keystream Biases in RC4On the structural weakness of the GGHN stream cipherMore glimpses of the RC4 internal state arrayHow TKIP Induces Biases of Internal States of Generic RC4Resilience to distinguishing attacks on WG-7 cipher and their generalizationsFinding an internal state of RC4 stream cipherRC4: non-randomness in the index \(j\) and some results on its cyclesGeneralization of roos bias in RC4 and some results on key-keystream relationsFull Plaintext Recovery Attack on Broadcast RC4Further non-randomness in RC4, RC4A and VMPCTruncated boomerang attacks and application to AES-based ciphersDifferential cryptanalysis of Salsa20 based on comprehensive analysis of PNBsRevisiting \textit{BoolTest} -- on randomness testing using Boolean functionsRevisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairsProving the biases of Salsa and ChaCha in differential attackNew Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4Efficient Reconstruction of RC4 Keys from Internal States(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipherProving empirical key-correlations in RC4Further clarification on Mantin's digraph repetition bias in RC4On Non-randomness of the Permutation After RC4 Key SchedulingThe analysis of the number of fixed points in the key extending algorithm of RC4Cryptanalysis of \textit{WG-8} and \textit{WG-16} stream ciphersCryptanalysis of the Full Spritz Stream CipherProving TLS-attack related open biases of RC4Attack on Broadcast RC4 RevisitedRevisiting (nested) Roos bias in RC4 key scheduling algorithmOn data complexity of distinguishing attacks versus message recovery attacks on stream ciphersNew State Recovery Attack on RC4Glimpses are forever in RC4 amidst the spectre of biasesTwo Trivial Attacks on TriviumPermutation After RC4 Key Scheduling Reveals the Secret KeyAttacks on the RC4 stream cipherOn non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret keyDiscovery and Exploitation of New Biases in RC4New Correlations of RC4 PRGA Using Nonzero-Bit DifferencesSettling the mystery of \(Z_{r} = r\) in RC4An overview of distinguishing attacks on stream ciphersOn biases of permutation and keystream bytes of RC4 towards the secret keyA new distinguishing and key recovery attack on NGG stream cipherNew Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-BAnalysis of RC4 and Proposal of Additional Layers for Better Security MarginNew Results on the Key Scheduling Algorithm of RC4




This page was built for publication: A Practical Attack on Broadcast RC4