scispace - formally typeset
Journal ArticleDOI

Finding an internal state of RC4 stream cipher

TLDR
A cryptanalytic attack that employs the tree representation of this cipher and introduces an abstraction in the form of general conditions for managing the information about its internal state is presented.
About
This article is published in Information Sciences.The article was published on 2007-04-01. It has received 45 citations till now. The article focuses on the topics: Stream cipher attack & Slide attack.

read more

Citations
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Journal ArticleDOI

(Non-)Random Sequences from (Non-)Random Permutations--Analysis of RC4 Stream Cipher

TL;DR: The effect of RC4 keylength on its keystream is investigated, and significant biases involving the length of the secret key are reported, and the existence of positive biases towards zero for all the initial bytes 3 to 255 is proved and exploited towards a generalized broadcast attack on RC4.
Book ChapterDOI

Discovery and exploitation of new biases in RC4

TL;DR: A technique to automatically reveal linear correlations in the PRGA of RC4 is presented and 9 new exploitable correlations have been revealed, which lead to a key recovery attack on WEP with only 9800 encrypted packets (less than 20 seconds), instead of 24200 for the best previous attack.
Posted Content

Analysis of RC4 and Proposal of Additional Layers for Better Security Margin.

TL;DR: Based on the analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are proposed in this paper.
Book ChapterDOI

Analysis of RC4 and Proposal of Additional Layers for Better Security Margin

TL;DR: Analysis of the modified cipher shows that this new strategy avoids existing weaknesses of RC4 and few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm are proposed.
References
More filters

[서평]「Applied Cryptography」

염흥렬
TL;DR: The objective of this paper is to give a comprehensive introduction to applied cryptography with an engineer or computer scientist in mind on the knowledge needed to create practical systems which supports integrity, confidentiality, or authenticity.
Book ChapterDOI

Weaknesses in the Key Scheduling Algorithm of RC4

TL;DR: It is shown that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages.
Journal ArticleDOI

The information sciences

TL;DR: Through a human centered design project focused on an information science problem, students will gain experience and a better understanding of the process to develop an innovative solution addressing a societal need.
Book

Heuristics : intelligent search strategies for computer problem solving

TL;DR: In this article, the authors present, characterizes and analyzes problem solving strategies that are guided by heuristic information, and characterise and analyze problem-solving strategies with heuristics.
Journal Article

A practical attack on broadcast RC4

TL;DR: In this article, the authors describe a major statistical weakness in RC4, which makes it trivial to distinguish between short outputs of RC4 and random strings by analyzing their second bytes, which can be used to mount a ciphertext-only attack on RC4 in some broadcast applications, in which the same plaintext is sent to multiple recipients under different keys.