Analysis Methods for (Alleged) RC4
From MaRDI portal
Publication:4249277
DOI10.1007/3-540-49649-1_26zbMath0931.94031OpenAlexW2123460950MaRDI QIDQ4249277
Willi Meier, Bart Preneel, Sven Verdoolaege, Vincent Rijmen, Lars R. Knudsen
Publication date: 17 June 1999
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/3-540-49649-1_26
Related Items
On the structural weakness of the GGHN stream cipher, How TKIP Induces Biases of Internal States of Generic RC4, Full Plaintext Recovery Attack on Broadcast RC4, Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck, Efficient Reconstruction of RC4 Keys from Internal States, (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher, A complete characterization of the evolution of RC4 pseudo random generation algorithm, The analysis of the number of fixed points in the key extending algorithm of RC4, New State Recovery Attack on RC4, Discovery and Exploitation of New Biases in RC4, New Correlations of RC4 PRGA Using Nonzero-Bit Differences, Settling the mystery of \(Z_{r} = r\) in RC4, A Theoretical Analysis of the Structure of HC-128, On biases of permutation and keystream bytes of RC4 towards the secret key, A new distinguishing and key recovery attack on NGG stream cipher, Analysis of RC4 and Proposal of Additional Layers for Better Security Margin, New Results on the Key Scheduling Algorithm of RC4, A probabilistic cryptanalytic method for a time-variant permutation generator