Passive–Only Key Recovery Attacks on RC4
From MaRDI portal
Publication:5452270
DOI10.1007/978-3-540-77360-3_22zbMATH Open1154.94437OpenAlexW1608372408MaRDI QIDQ5452270FDOQ5452270
Authors: Serge Vaudenay, Martin Vuagnoux
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77360-3_22
Recommendations
- Key recovery attacks on recent authenticated ciphers
- Full plaintext recovery attack on broadcast RC4
- Attacks on the RC4 stream cipher
- Attack on broadcast RC4 revisited
- Partial key recovery attack against RMAC
- A Practical Attack on Broadcast RC4
- Practical key recovery attacks on FlexAEAD
- A new practical key recovery attack on the stream cipher RC4 under related-key model
- Cryptography and Coding
Cites Work
Cited In (22)
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- Discovery and exploitation of new biases in RC4
- Statistical attack on RC4. Distinguishing WPA
- Proof of empirical RC4 biases and new key correlations
- Smashing WEP in a passive attack
- Proving empirical key-correlations in RC4
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Plaintext Recovery Attacks Against WPA/TKIP
- New Results on the Key Scheduling Algorithm of RC4
- On Reconstruction of RC4 Keys from Internal States
- Some remarks on the TKIP key mixing function of IEEE 802.11i
- Efficient Reconstruction of RC4 Keys from Internal States
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- A new distinguishing and key recovery attack on NGG stream cipher
- On biases of permutation and keystream bytes of RC4 towards the secret key
- Title not available (Why is that?)
- The design and implementation of protocol-based hidden key recovery
- A new practical key recovery attack on the stream cipher RC4 under related-key model
- Wired equivalent privacy reinvestigated
- New iterated RC4 key correlations
- On the structural weakness of the GGHN stream cipher
This page was built for publication: Passive–Only Key Recovery Attacks on RC4
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5452270)