New State Recovery Attack on RC4
From MaRDI portal
Publication:3600226
DOI10.1007/978-3-540-85174-5_17zbMath1183.94041OpenAlexW1592773427MaRDI QIDQ3600226
Dmitry Khovratovich, Alexander Maksimov
Publication date: 10 February 2009
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-85174-5_17
Related Items
Proof of Empirical RC4 Biases and New Key Correlations, Some Proofs of Joint Distributions of Keystream Biases in RC4, On the structural weakness of the GGHN stream cipher, How TKIP Induces Biases of Internal States of Generic RC4, Full Plaintext Recovery Attack on Broadcast RC4, Optimising Gröbner bases on Bivium, Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck, Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs, (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher, A complete characterization of the evolution of RC4 pseudo random generation algorithm, Cryptanalysis of the Full Spritz Stream Cipher, Attack on Broadcast RC4 Revisited, New State Recovery Attack on RC4, Discovery and Exploitation of New Biases in RC4, Settling the mystery of \(Z_{r} = r\) in RC4, A Theoretical Analysis of the Structure of HC-128, On biases of permutation and keystream bytes of RC4 towards the secret key, A new distinguishing and key recovery attack on NGG stream cipher, On the Evolution of GGHN Cipher, Analysis of RC4 and Proposal of Additional Layers for Better Security Margin, New Results on the Key Scheduling Algorithm of RC4
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- A Practical Attack on Broadcast RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- New State Recovery Attack on RC4
- Analysis Methods for (Alleged) RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Fast Software Encryption
- Fast Software Encryption