메뉴 건너뛰기




Volumn 177, Issue 7, 2007, Pages 1715-1727

Finding an internal state of RC4 stream cipher

Author keywords

Algorithm; Complexity; Cryptanalysis; RC4; Stream cipher

Indexed keywords

ALGORITHMS; COMPUTATIONAL COMPLEXITY; DATA STRUCTURES; SECURITY OF DATA;

EID: 33846288293     PISSN: 00200255     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ins.2006.10.010     Document Type: Article
Times cited : (31)

References (16)
  • 1
    • 26444596644 scopus 로고    scopus 로고
    • Impossible fault analysis of RC4 and differential fault analysis, Fast Software Encryption 2005
    • Biham E., Granboulan L., and Nguyen P. Impossible fault analysis of RC4 and differential fault analysis, Fast Software Encryption 2005. Lecture Notes in Computer Science 3557 (2005) 359-367
    • (2005) Lecture Notes in Computer Science , vol.3557 , pp. 359-367
    • Biham, E.1    Granboulan, L.2    Nguyen, P.3
  • 2
    • 84949223752 scopus 로고    scopus 로고
    • Weakness in the key scheduling algorithm of RC4, Selected Areas in Cryptography 2001
    • Fluhrer S., Mantin I., and Shamir A. Weakness in the key scheduling algorithm of RC4, Selected Areas in Cryptography 2001. Lecture Notes in Computer Science 2259 (2001) 1-24
    • (2001) Lecture Notes in Computer Science , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 3
    • 84974666258 scopus 로고    scopus 로고
    • Statistical analysis of the alleged RC4 Keystream Generator, Fast Software Encryption 2000
    • Fluhrer S., and McGrew D. Statistical analysis of the alleged RC4 Keystream Generator, Fast Software Encryption 2000. Lecture Notes in Computer Science 1978 (2000) 19-30
    • (2000) Lecture Notes in Computer Science , vol.1978 , pp. 19-30
    • Fluhrer, S.1    McGrew, D.2
  • 4
    • 84957380512 scopus 로고    scopus 로고
    • Linear statistical weakness of alleged RC4 Keystream Generator, Advances in Cryptology - EUROCRYPT '97
    • Golić J. Linear statistical weakness of alleged RC4 Keystream Generator, Advances in Cryptology - EUROCRYPT '97. Lecture Notes in Computer Science 1233 (1997) 226-238
    • (1997) Lecture Notes in Computer Science , vol.1233 , pp. 226-238
    • Golić, J.1
  • 5
    • 33846321363 scopus 로고    scopus 로고
    • A. Grosul, D. Wallach, A related-key cryptanalysis of RC4, Rice University, Technical Report TR-00-358, June 2000.
  • 7
    • 24944554565 scopus 로고    scopus 로고
    • Predicting and distinguishing attacks on RC4 Keystream generator, Advances in Cryptology - EUROCRYPT 20 05
    • Mantin I. Predicting and distinguishing attacks on RC4 Keystream generator, Advances in Cryptology - EUROCRYPT 20 05. Lecture Notes in Computer Science 3494 (2005) 491-506
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 491-506
    • Mantin, I.1
  • 8
    • 84958972140 scopus 로고    scopus 로고
    • "A practical attack on broadcast RC4". Fast Software Encryption FSE 2001
    • Mantin I., and Shamir A. "A practical attack on broadcast RC4". Fast Software Encryption FSE 2001. Lecture Notes in Computer Science 2355 (2002) 152-164
    • (2002) Lecture Notes in Computer Science , vol.2355 , pp. 152-164
    • Mantin, I.1    Shamir, A.2
  • 9
    • 84859054985 scopus 로고    scopus 로고
    • Cryptanalysis of RC4-like ciphers, Selected Areas in Cryptography - SAC '98
    • Mister S., and Tavares S. Cryptanalysis of RC4-like ciphers, Selected Areas in Cryptography - SAC '98. Lecture Notes in Computer Science 1556 (1999) 131-143
    • (1999) Lecture Notes in Computer Science , vol.1556 , pp. 131-143
    • Mister, S.1    Tavares, S.2
  • 10
    • 26444620896 scopus 로고    scopus 로고
    • A new weakness in the RC4 Keystream generator and an approach to improve the security of the cipher, Fast Software Encryption FSE
    • Paul S., and Prennel B. A new weakness in the RC4 Keystream generator and an approach to improve the security of the cipher, Fast Software Encryption FSE. Lecture Notes in Computer Science 3017 (2004) 245-259
    • (2004) Lecture Notes in Computer Science , vol.3017 , pp. 245-259
    • Paul, S.1    Prennel, B.2
  • 11
    • 0347526103 scopus 로고    scopus 로고
    • Analysis of non-fortuitons predictive states of the RC4 Keystream generator, INDOCRYPT
    • Paul S., and Prennel B. Analysis of non-fortuitons predictive states of the RC4 Keystream generator, INDOCRYPT. Lecture Notes in Computer Science 2904 (2003) 52-67
    • (2003) Lecture Notes in Computer Science , vol.2904 , pp. 52-67
    • Paul, S.1    Prennel, B.2
  • 12
    • 33846317205 scopus 로고    scopus 로고
    • J. Pearl, Heuristics - Intelligent search strategies for computer problem solving, Addison-Wesley Series in Artificial Intelligence, 1984.
  • 13
    • 33846334950 scopus 로고    scopus 로고
    • A. Roos, A class of weak keys in the RC4 stream cipher, Sci. Crypt., September 1995.
  • 15
    • 33846324124 scopus 로고    scopus 로고
    • V. Tomašević, S. Bojanić, O. Nieto-Taladriz, An approach for analysis of stream ciphers based on table-shuffling. The State of the Art of Stream Ciphers, Workshop Record, Brugge, October 2004, pp. 165-174.
  • 16
    • 33745983856 scopus 로고    scopus 로고
    • OWA trees and their role in security modeling using attack trees
    • Yager R.R. OWA trees and their role in security modeling using attack trees. Information Science 176/20 (2006) 2933-2959
    • (2006) Information Science , vol.176-20 , pp. 2933-2959
    • Yager, R.R.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.