Predicting and Distinguishing Attacks on RC4 Keystream Generator
From MaRDI portal
Publication:5385747
DOI10.1007/11426639_29zbMath1137.94351OpenAlexW1566979565MaRDI QIDQ5385747
Publication date: 6 May 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11426639_29
Related Items (28)
On the structural weakness of the GGHN stream cipher ⋮ Finding an internal state of RC4 stream cipher ⋮ Full Plaintext Recovery Attack on Broadcast RC4 ⋮ Further non-randomness in RC4, RC4A and VMPC ⋮ Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck ⋮ Revisiting RC4 key collision: faster search algorithm and new 22-byte colliding key pairs ⋮ New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 ⋮ Efficient Reconstruction of RC4 Keys from Internal States ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ Further clarification on Mantin's digraph repetition bias in RC4 ⋮ On Non-randomness of the Permutation After RC4 Key Scheduling ⋮ Proving TLS-attack related open biases of RC4 ⋮ Analysing and exploiting the Mantin biases in RC4 ⋮ Attack on Broadcast RC4 Revisited ⋮ Statistical attacks on cookie masking for RC4 ⋮ On data complexity of distinguishing attacks versus message recovery attacks on stream ciphers ⋮ New State Recovery Attack on RC4 ⋮ Glimpses are forever in RC4 amidst the spectre of biases ⋮ Permutation After RC4 Key Scheduling Reveals the Secret Key ⋮ Attacks on the RC4 stream cipher ⋮ On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ New Correlations of RC4 PRGA Using Nonzero-Bit Differences ⋮ Differential Bias Attack for Block Cipher Under Randomized Leakage with Key Enumeration ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ New Results on the Key Scheduling Algorithm of RC4
This page was built for publication: Predicting and Distinguishing Attacks on RC4 Keystream Generator