New Results on the Key Scheduling Algorithm of RC4
From MaRDI portal
Publication:5504609
DOI10.1007/978-3-540-89754-5_4zbMath1203.94089OpenAlexW1514674457MaRDI QIDQ5504609
Pınar Kavak, Mete Akgün, H. Demirci
Publication date: 22 January 2009
Published in: Progress in Cryptology - INDOCRYPT 2008 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-89754-5_4
Related Items (3)
(Non-)random sequences from (non-)random permutations -- analysis of RC4 stream cipher ⋮ On biases of permutation and keystream bytes of RC4 towards the secret key ⋮ Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Attacks on the RC4 stream cipher
- A Practical Attack on Broadcast RC4
- New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
- Efficient Reconstruction of RC4 Keys from Internal States
- New State Recovery Attack on RC4
- Analysis Methods for (Alleged) RC4
- Predicting and Distinguishing Attacks on RC4 Keystream Generator
- Passive–Only Key Recovery Attacks on RC4
- Permutation After RC4 Key Scheduling Reveals the Secret Key
- On Reconstruction of RC4 Keys from Internal States
This page was built for publication: New Results on the Key Scheduling Algorithm of RC4