Passive–Only Key Recovery Attacks on RC4
From MaRDI portal
Publication:5452270
Recommendations
- Key recovery attacks on recent authenticated ciphers
- Full plaintext recovery attack on broadcast RC4
- Attacks on the RC4 stream cipher
- Attack on broadcast RC4 revisited
- Partial key recovery attack against RMAC
- A Practical Attack on Broadcast RC4
- Practical key recovery attacks on FlexAEAD
- A new practical key recovery attack on the stream cipher RC4 under related-key model
- Cryptography and Coding
Cites work
- scientific article; zbMATH DE number 1942428 (Why is no real title available?)
- scientific article; zbMATH DE number 2085191 (Why is no real title available?)
- scientific article; zbMATH DE number 3268246 (Why is no real title available?)
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Attacks on the RC4 stream cipher
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
Cited in
(22)- Discovery and exploitation of new biases in RC4
- The design and implementation of protocol-based hidden key recovery
- Statistical attack on RC4. Distinguishing WPA
- A new distinguishing and key recovery attack on NGG stream cipher
- On biases of permutation and keystream bytes of RC4 towards the secret key
- Proof of empirical RC4 biases and new key correlations
- scientific article; zbMATH DE number 2085191 (Why is no real title available?)
- New iterated RC4 key correlations
- New Results on the Key Scheduling Algorithm of RC4
- On Reconstruction of RC4 Keys from Internal States
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- Some remarks on the TKIP key mixing function of IEEE 802.11i
- Proving empirical key-correlations in RC4
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- Smashing WEP in a passive attack
- Wired equivalent privacy reinvestigated
- On the structural weakness of the GGHN stream cipher
- Plaintext Recovery Attacks Against WPA/TKIP
- Efficient Reconstruction of RC4 Keys from Internal States
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- A new practical key recovery attack on the stream cipher RC4 under related-key model
- A Practical Attack on the Fixed RC4 in the WEP Mode
This page was built for publication: Passive–Only Key Recovery Attacks on RC4
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5452270)