Passive–Only Key Recovery Attacks on RC4
From MaRDI portal
Publication:5452270
DOI10.1007/978-3-540-77360-3_22zbMath1154.94437OpenAlexW1608372408MaRDI QIDQ5452270
Serge Vaudenay, Martin Vuagnoux
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77360-3_22
Related Items (12)
Proof of Empirical RC4 Biases and New Key Correlations ⋮ On the structural weakness of the GGHN stream cipher ⋮ Smashing WEP in a Passive Attack ⋮ New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 ⋮ Efficient Reconstruction of RC4 Keys from Internal States ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ Proving empirical key-correlations in RC4 ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ New Results on the Key Scheduling Algorithm of RC4
Cites Work
This page was built for publication: Passive–Only Key Recovery Attacks on RC4