Journal ArticleDOI
Finding an internal state of RC4 stream cipher
TLDR
A cryptanalytic attack that employs the tree representation of this cipher and introduces an abstraction in the form of general conditions for managing the information about its internal state is presented.About:
This article is published in Information Sciences.The article was published on 2007-04-01. It has received 45 citations till now. The article focuses on the topics: Stream cipher attack & Slide attack.read more
Citations
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI
(Non-)Random Sequences from (Non-)Random Permutations--Analysis of RC4 Stream Cipher
TL;DR: The effect of RC4 keylength on its keystream is investigated, and significant biases involving the length of the secret key are reported, and the existence of positive biases towards zero for all the initial bytes 3 to 255 is proved and exploited towards a generalized broadcast attack on RC4.
Book ChapterDOI
Discovery and exploitation of new biases in RC4
TL;DR: A technique to automatically reveal linear correlations in the PRGA of RC4 is presented and 9 new exploitable correlations have been revealed, which lead to a key recovery attack on WEP with only 9800 encrypted packets (less than 20 seconds), instead of 24200 for the best previous attack.
Posted Content
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin.
Subhamoy Maitra,Goutam Paul +1 more
TL;DR: Based on the analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are proposed in this paper.
Book ChapterDOI
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
Subhamoy Maitra,Goutam Paul +1 more
TL;DR: Analysis of the modified cipher shows that this new strategy avoids existing weaknesses of RC4 and few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm are proposed.
References
More filters
[서평]「Applied Cryptography」
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Book ChapterDOI
Weaknesses in the Key Scheduling Algorithm of RC4
TL;DR: It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages.
Journal ArticleDOI
The information sciences
TL;DR: Through a human centered design project focused on an information science problem, students will gain experience and a better understanding of the process to develop an innovative solution addressing a societal need.
Book
Heuristics : intelligent search strategies for computer problem solving
TL;DR: In this article, the authors present, characterizes and analyzes problem solving strategies that are guided by heuristic information, and characterise and analyze problem-solving strategies with heuristics.
Journal Article
A practical attack on broadcast RC4
Itsik Mantin,Adi Shamir +1 more
TL;DR: In this article, the authors describe a major statistical weakness in RC4, which makes it trivial to distinguish between short outputs of RC4 and random strings by analyzing their second bytes, which can be used to mount a ciphertext-only attack on RC4 in some broadcast applications, in which the same plaintext is sent to multiple recipients under different keys.