Predicting and Distinguishing Attacks on RC4 Keystream Generator

From MaRDI portal
Publication:5385747

DOI10.1007/11426639_29zbMath1137.94351OpenAlexW1566979565MaRDI QIDQ5385747

Itsik Mantin

Publication date: 6 May 2008

Published in: Lecture Notes in Computer Science (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1007/11426639_29




Related Items (28)

On the structural weakness of the GGHN stream cipherFinding an internal state of RC4 stream cipherFull Plaintext Recovery Attack on Broadcast RC4Further non-randomness in RC4, RC4A and VMPCRecovering RC4 Permutation from 2048 Keystream Bytes if j Is StuckRevisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairsNew Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4Efficient Reconstruction of RC4 Keys from Internal States(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipherFurther clarification on Mantin's digraph repetition bias in RC4On Non-randomness of the Permutation After RC4 Key SchedulingProving TLS-attack related open biases of RC4Analysing and exploiting the Mantin biases in RC4Attack on Broadcast RC4 RevisitedStatistical attacks on cookie masking for RC4On data complexity of distinguishing attacks versus message recovery attacks on stream ciphersNew State Recovery Attack on RC4Glimpses are forever in RC4 amidst the spectre of biasesPermutation After RC4 Key Scheduling Reveals the Secret KeyAttacks on the RC4 stream cipherOn non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret keyDiscovery and Exploitation of New Biases in RC4New Correlations of RC4 PRGA Using Nonzero-Bit DifferencesDifferential Bias Attack for Block Cipher Under Randomized Leakage with Key EnumerationOn biases of permutation and keystream bytes of RC4 towards the secret keyA new distinguishing and key recovery attack on NGG stream cipherAnalysis of RC4 and Proposal of Additional Layers for Better Security MarginNew Results on the Key Scheduling Algorithm of RC4







This page was built for publication: Predicting and Distinguishing Attacks on RC4 Keystream Generator