Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
From MaRDI portal
Publication:5504607
DOI10.1007/978-3-540-89754-5_3zbMATH Open1203.94115OpenAlexW2148721465WikidataQ56060511 ScholiaQ56060511MaRDI QIDQ5504607FDOQ5504607
Authors: Subhamoy Maitra, Goutam Paul
Publication date: 22 January 2009
Published in: Progress in Cryptology - INDOCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89754-5_3
Recommendations
Cites Work
- A Practical Attack on Broadcast RC4
- Title not available (Why is that?)
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Title not available (Why is that?)
- On Non-randomness of the Permutation After RC4 Key Scheduling
- New Applications of Time Memory Data Tradeoffs
- Attacks on the RC4 stream cipher
- On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- New State Recovery Attack on RC4
- Progress in Cryptology - INDOCRYPT 2003
- Fast Software Encryption
- Finding an internal state of RC4 stream cipher
- Fast Software Encryption
- Fast Software Encryption
- Information Security and Cryptology
- Analysis Methods for (Alleged) RC4
- A Practical Attack on the Fixed RC4 in the WEP Mode
- Passive–Only Key Recovery Attacks on RC4
- New Results on the Key Scheduling Algorithm of RC4
- A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher
Cited In (10)
- On security properties of RC5 cipher's non standard modifications
- MARC: modified ARC4
- Cryptanalysis of the full Spritz stream cipher
- Analysis of burn-in period for RC4 state transition
- Some proofs of joint distributions of keystream biases in RC4
- Some combinatorial aspects of the KSAm-like algorithms suitable for RC4 stream cipher
- Security analysis of replace key matrix encryption algorithm
- Affine equivalence and non-linearity of permutations over \(\mathbb Z_n\)
- Problem and improvement of Rijndael key generation algorithm
- Fast Software Encryption
Uses Software
This page was built for publication: Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5504607)