Permutation After RC4 Key Scheduling Reveals the Secret Key
From MaRDI portal
Publication:5452271
DOI10.1007/978-3-540-77360-3_23zbMath1154.94427OpenAlexW1742803828MaRDI QIDQ5452271
Publication date: 25 March 2008
Published in: Selected Areas in Cryptography (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-77360-3_23
Related Items (17)
How TKIP Induces Biases of Internal States of Generic RC4 ⋮ Generalization of roos bias in RC4 and some results on key-keystream relations ⋮ Smashing WEP in a Passive Attack ⋮ Full Plaintext Recovery Attack on Broadcast RC4 ⋮ New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4 ⋮ Efficient Reconstruction of RC4 Keys from Internal States ⋮ (Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ Proving empirical key-correlations in RC4 ⋮ On Non-randomness of the Permutation After RC4 Key Scheduling ⋮ Revisiting (nested) Roos bias in RC4 key scheduling algorithm ⋮ Permutation After RC4 Key Scheduling Reveals the Secret Key ⋮ Discovery and Exploitation of New Biases in RC4 ⋮ Settling the mystery of \(Z_{r} = r\) in RC4 ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ A new distinguishing and key recovery attack on NGG stream cipher ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin ⋮ New Results on the Key Scheduling Algorithm of RC4
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attacks on the RC4 stream cipher
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- A Practical Attack on Broadcast RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Progress in Cryptology - INDOCRYPT 2003
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- Fast Software Encryption
This page was built for publication: Permutation After RC4 Key Scheduling Reveals the Secret Key