A Practical Attack on the Fixed RC4 in the WEP Mode
From MaRDI portal
Publication:5451081
DOI10.1007/11593447_21zbMATH Open1154.94415OpenAlexW1572840940MaRDI QIDQ5451081FDOQ5451081
Authors: Itsik Mantin
Publication date: 18 March 2008
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11593447_21
Recommendations
RC4CryptanalysisStream ciphersSide-channel attacksFault analysisRelated IV attacksRelated key attacks
Cited In (22)
- Some observations on HC-128
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- An ultrafast cryptographically secure pseudorandom number generator
- Discovery and exploitation of new biases in RC4
- Smashing WEP in a passive attack
- Proving empirical key-correlations in RC4
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- Improved BV-based quantum attack on block ciphers
- Plaintext Recovery Attacks Against WPA/TKIP
- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
- A complete characterization of the evolution of RC4 pseudo random generation algorithm
- Passive–Only Key Recovery Attacks on RC4
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- A new distinguishing and key recovery attack on NGG stream cipher
- On biases of permutation and keystream bytes of RC4 towards the secret key
- Fast Software Encryption
- A new practical key recovery attack on the stream cipher RC4 under related-key model
- On Non-randomness of the Permutation After RC4 Key Scheduling
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Generalization of roos bias in RC4 and some results on key-keystream relations
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- A quantum related-key attack based on the Bernstein-Vazirani algorithm
This page was built for publication: A Practical Attack on the Fixed RC4 in the WEP Mode
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5451081)