Permutation After RC4 Key Scheduling Reveals the Secret Key
From MaRDI portal
Publication:5452271
DOI10.1007/978-3-540-77360-3_23zbMATH Open1154.94427OpenAlexW1742803828MaRDI QIDQ5452271FDOQ5452271
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77360-3_23
Recommendations
- On Non-randomness of the Permutation After RC4 Key Scheduling
- On biases of permutation and keystream bytes of RC4 towards the secret key
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- New Results on the Key Scheduling Algorithm of RC4
- Key wrapping with a fixed permutation
- Cryptanalysis of the permutation based algorithm SpoC
- Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- Cryptanalysis of Boolean permutation-based key escrow scheme
- Permutation polynomials and a new public-key encryption
Cites Work
- A Practical Attack on Broadcast RC4
- Title not available (Why is that?)
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Title not available (Why is that?)
- Title not available (Why is that?)
- Attacks on the RC4 stream cipher
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Progress in Cryptology - INDOCRYPT 2003
- Fast Software Encryption
- A Practical Attack on the Fixed RC4 in the WEP Mode
Cited In (18)
- Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
- Proving empirical key-correlations in RC4
- (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher
- Full Plaintext Recovery Attack on Broadcast RC4
- Smashing WEP in a Passive Attack
- Discovery and Exploitation of New Biases in RC4
- New Results on the Key Scheduling Algorithm of RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Settling the mystery of \(Z_{r} = r\) in RC4
- A new distinguishing and key recovery attack on NGG stream cipher
- On biases of permutation and keystream bytes of RC4 towards the secret key
- On Non-randomness of the Permutation After RC4 Key Scheduling
- How TKIP Induces Biases of Internal States of Generic RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Generalization of roos bias in RC4 and some results on key-keystream relations
- Revisiting (nested) Roos bias in RC4 key scheduling algorithm
- On some sequences of the secret pseudo-random index \(j\) in RC4 key scheduling
This page was built for publication: Permutation After RC4 Key Scheduling Reveals the Secret Key
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5452271)