메뉴 건너뛰기




Volumn E91-A, Issue 1, 2008, Pages 3-11

New weakness in the key-scheduling algorithm of RC4

Author keywords

Cryptanalysis; Key scheduling algorithm; RC4; Stream cipher

Indexed keywords

ACCESS CONTROL; INVERSE PROBLEMS; RECOVERY; SCHEDULING ALGORITHMS;

EID: 70350556447     PISSN: 09168508     EISSN: 17451337     Source Type: Journal    
DOI: 10.1093/ietfec/e91-a.1.3     Document Type: Article
Times cited : (8)

References (40)
  • 2
    • 0001859010 scopus 로고
    • Stream ciphers
    • ed. G.J. Simmons, IEEE Press, New York
    • R.A. Rueppel, "Stream ciphers," in Contemporary Cryptology, ed. G.J. Simmons, pp.65-134, IEEE Press, New York, 1992.
    • (1992) Contemporary Cryptology , pp. 65-134
    • Rueppel, R.A.1
  • 3
    • 84957630525 scopus 로고    scopus 로고
    • SOBER cryptanalysis
    • Proc. FSE'99 Springer-Verlag
    • D. Bleichenbacher and S. Patel, "SOBER cryptanalysis," Proc. FSE'99, LNCS 1636, pp.305-316, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1636 , pp. 305-316
    • Bleichenbacher, D.1    Patel, S.2
  • 4
    • 84937412475 scopus 로고    scopus 로고
    • Exploiting multiples of the connection polynomial in word-oriented stream cipher
    • Proc. ASIACRYPT2000 Springer-Verlag
    • P. Hawkes and G. Rose, "Exploiting multiples of the connection polynomial in word-oriented stream cipher," Proc. ASIACRYPT2000, LNCS 1976, pp.302-316, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1976 , pp. 302-316
    • Hawkes, P.1    Rose, G.2
  • 5
    • 24944553900 scopus 로고    scopus 로고
    • Guess-and-determine attacks on SNOW
    • Proc. SAC'02, Springer-Verlag
    • P. Hawkes and G. Rose, "Guess-and-determine attacks on SNOW," Proc. SAC'02, LNCS 2595, pp.37-116, Springer-Verlag, 2003.
    • (2003) LNCS , vol.2595 , pp. 37-116
    • Hawkes, P.1    Rose, G.2
  • 6
    • 27844517104 scopus 로고    scopus 로고
    • Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers
    • Oct.
    • S. Kiyomoto, T. Tanaka, and K. Sakurai, "Experimental analysis of guess-and-determine attacks on clock-controlled stream ciphers," IEICE Trans. Fundamentals, vol.E88-A, no.10, pp.2778-2791, Oct. 2005.
    • (2005) IEICE Trans. Fundamentals , vol.E88-A , Issue.10 , pp. 2778-2791
    • Kiyomoto, S.1    Tanaka, T.2    Sakurai, K.3
  • 9
    • 84879530904 scopus 로고    scopus 로고
    • A guess-and-determine attack on the stream cipher Polar Bear
    • available at
    • J. Mattsson, "A guess-and-determine attack on the stream cipher Polar Bear," ECRYPT Stream Cipher Project, Report 2006/017, 2006, available at http://www.ecrypt.eu.org/stream/papersdir/2006/017.pdf
    • (2006) ECRYPT Stream Cipher Project, Report 2006/017
    • Mattsson, J.1
  • 11
    • 79959372828 scopus 로고    scopus 로고
    • Wireless Ian medium access control (MAC) and physical layer (PHY) specifications
    • IEEE Computer Society
    • IEEE Computer Society, "Wireless Ian medium access control (MAC) and physical layer (PHY) specifications," IEEE Std 802.11, 1999.
    • (1999) IEEE Std. 802.11
  • 12
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the key scheduling algorithm of RC4
    • Proc. SAC2001, Springer-Verlag
    • S. Fluhrer, I. Mantin, and A. Shamir, "Weaknesses in the key scheduling algorithm of RC4," Proc. SAC2001, LNCS 2259, pp.1-24, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2259 , pp. 1-24
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 13
    • 33748569747 scopus 로고    scopus 로고
    • Attacks on RC4 and WEP
    • RSA Laboratories
    • S. Fluhrer, I. Mantin, and A. Shamir, "Attacks on RC4 and WEP," CryptoBytes, vol.5, no.2, pp.26-34, RSA Laboratories, 2002.
    • (2002) CryptoBytes , vol.5 , Issue.2 , pp. 26-34
    • Fluhrer, S.1    Mantin, I.2    Shamir, A.3
  • 14
    • 3142552643 scopus 로고    scopus 로고
    • A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)
    • May
    • A. Stubblefield, J. Ioannidis, and A.D. Rubin, "A key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)," ACM Trans. Information and System Security, vol.7, no.2, pp.319-332, May 2004.
    • (2004) ACM Trans. Information and System Security , vol.7 , Issue.2 , pp. 319-332
    • Stubblefield, A.1    Ioannidis, J.2    Rubin, A.D.3
  • 15
    • 85027171139 scopus 로고    scopus 로고
    • available at
    • Wepcrack, available at http://sourceforge.net/projects/wepcrack/
  • 16
    • 85027162903 scopus 로고    scopus 로고
    • Yet other weak IVs for recovering wep keys
    • Parma, Italy, Oct.
    • K. Kobara and H. Imai, "Yet other weak IVs for recovering wep keys" Proc. ISITA2004, pp.1130-1134, Parma, Italy, Oct. 2004.
    • (2004) Proc. ISITA2004 , pp. 1130-1134
    • Kobara, K.1    Imai, H.2
  • 17
    • 33646844622 scopus 로고    scopus 로고
    • FMS attack-resistant WEP implementation is still broken - Most IVs leak a part of key information
    • Proc. CIS2005, Part II, Springer-Verlag
    • T. Ohigashi, Y. Shiraishi, and M. Morii, "FMS attack-resistant WEP implementation is still broken - Most IVs leak a part of key information," Proc. CIS2005, Part II, Lecture Notes in Artificial Intelligence, vol.3802, pp.17-26, Springer-Verlag, 2005.
    • (2005) Lecture Notes in Artificial Intelligence , vol.3802 , pp. 17-26
    • Ohigashi, T.1    Shiraishi, Y.2    Morii, M.3
  • 18
    • 33748578653 scopus 로고    scopus 로고
    • Key-dependent weak IVs and weak keys in WEP - How to trace conditions back to their patterns
    • Aug.
    • K. Kobara and H. Imai, "Key-dependent weak IVs and weak keys in WEP - How to trace conditions back to their patterns," IEICE Trans. Fundamentals, vol.E89-A, no.8, pp.2198-2206, Aug. 2006.
    • (2006) IEICE Trans. Fundamentals , vol.E89-A , Issue.8 , pp. 2198-2206
    • Kobara, K.1    Imai, H.2
  • 21
    • 50249147960 scopus 로고    scopus 로고
    • Breaking 104 bit WEP in less than 60 seconds
    • available at
    • E. Tews, R. Weinmann, and A. Pyshkin, "Breaking 104 bit WEP in less than 60 seconds," Cryptology ePrint, 2007, available at http://eprint.iacr.org/2007/120.pdf
    • (2007) Cryptology EPrint
    • Tews, E.1    Weinmann, R.2    Pyshkin, A.3
  • 23
    • 84898198306 scopus 로고    scopus 로고
    • Wi-Fi Alliance, available at
    • Wi-Fi Alliance, "Wi-Fi protected access," available at http://www.weca.net/opensection/protected-access.asp
    • Wi-Fi Protected Access
  • 24
    • 84958985862 scopus 로고    scopus 로고
    • Iterative probabilistic cryptanalysis of RC4 keystream generator
    • Proc. ACISP2000, Springer-Verlag
    • J. Dj. Golić, "Iterative probabilistic cryptanalysis of RC4 keystream generator," Proc. ACISP2000, LNCS 1841, pp.220-233, Springer-Verlag, 2000.
    • (2000) LNCS , vol.1841 , pp. 220-233
    • Dj. Golić, J.1
  • 25
    • 48349116107 scopus 로고    scopus 로고
    • Linear statistical weakness of alleged RC4 keystream generator
    • Proc. EUROCRYPT'97, Springer-Verlag
    • I. Dj. Golić, "Linear statistical weakness of alleged RC4 keystream generator," Proc. EUROCRYPT'97, LNCS 1233, pp.226-238, Springer-Verlag, 1997.
    • (1997) LNCS , vol.1233 , pp. 226-238
    • Dj. Golić, I.1
  • 26
    • 84974666258 scopus 로고    scopus 로고
    • Statistical analysis of the alleged RC4 keystream generator
    • Proc. FSE2000
    • S. Fluhrer and D. McGrew, "Statistical analysis of the alleged RC4 keystream generator" Proc. FSE2000, LNCS 1978, pp.19-30, 2001.
    • (2001) LNCS , vol.1978 , pp. 19-30
    • Fluhrer, S.1    McGrew, D.2
  • 27
    • 84958972140 scopus 로고    scopus 로고
    • A practical attack on broadcast RC4
    • Proc. FSE2001,Springer-Verlag
    • I. Mantin and A. Shamir, "A practical attack on broadcast RC4," Proc. FSE2001, LNCS 2355, pp.152-164, Springer-Verlag, 2001.
    • (2001) LNCS , vol.2355 , pp. 152-164
    • Mantin, I.1    Shamir, A.2
  • 28
    • 26444620896 scopus 로고    scopus 로고
    • A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher
    • Proc. FSE2004, Springer-Verlag
    • S. Paul and B. Preneel, "A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher," Proc. FSE2004, LNCS 3017, pp.245-259, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3017 , pp. 245-259
    • Paul, S.1    Preneel, B.2
  • 29
    • 24944554565 scopus 로고    scopus 로고
    • Predicting and distinguishing attacks on RC4 keystream generator
    • Proc. EUROCRYPT2005, Springer-Verlag
    • I. Mantin, "Predicting and distinguishing attacks on RC4 keystream generator," Proc. EUROCRYPT2005, LNCS 3494, pp.491-506, Springer-Verlag, 2005.
    • (2005) LNCS , vol.3494 , pp. 491-506
    • Mantin, I.1
  • 30
    • 38349034222 scopus 로고    scopus 로고
    • available at
    • R. Jenkins, "Isaac and RC4," available at http://burtleburtle. net/bob/rand/isaac.html
    • Isaac and RC4
    • Jenkins, R.1
  • 31
    • 84944076741 scopus 로고    scopus 로고
    • Analysis methods for (alleged) RC4
    • Proc. ASIACRYPT'98, Springer-Verlag
    • L.R. Knudsen, W. Meier, B. Preneel, V. Rijmen, and S. Verdoolaege, "Analysis methods for (alleged) RC4," Proc. ASIACRYPT'98, LNCS 1514, pp.327-341, Springer-Verlag, 1998.
    • (1998) LNCS , vol.1514 , pp. 327-341
    • Knudsen, L.R.1    Meier, W.2    Preneel, B.3    Rijmen, V.4    Verdoolaege, S.5
  • 32
    • 84859054985 scopus 로고    scopus 로고
    • Cryptanalysis of RC4-like ciphers
    • Proc. SAC'98, Springer-Verlag
    • S. Mister and S.E. Tavares, "Cryptanalysis of RC4-like ciphers," Proc. SAC'98, LNCS 1556, pp.131-143, Springer-Verlag, 1999.
    • (1999) LNCS , vol.1556 , pp. 131-143
    • Mister, S.1    Tavares, S.E.2
  • 33
    • 0242413023 scopus 로고    scopus 로고
    • Internal-state reconstruction of a stream cipher RC4
    • Oct.
    • Y Shiraishi, T. Ohigashi, and M. Morii, "Internal-state reconstruction of a stream cipher RC4," IEICE Trans. Fundamentals, vol.E86-A, no.10, pp.2636-2638, Oct. 2003.
    • (2003) IEICE Trans. Fundamentals , vol.E86-A , Issue.10 , pp. 2636-2638
    • Shiraishi, Y.1    Ohigashi, T.2    Morii, M.3
  • 34
    • 35048865762 scopus 로고    scopus 로고
    • Reducing the state space of RC4 stream cipher
    • Proc. ICCS2004, Springer-Verlag
    • V. Tomaševič and S. Bojanič, "Reducing the state space of RC4 stream cipher," Proc. ICCS2004, LNCS 3036, pp.644-647, Springer-Verlag, 2004.
    • (2004) LNCS , vol.3036 , pp. 644-647
    • Tomaševič, V.1    Bojanič, S.2
  • 36
    • 85027171231 scopus 로고    scopus 로고
    • available at
    • AirSnort, available at http://airsnort.shmoo.com/
  • 37
    • 85027141143 scopus 로고    scopus 로고
    • Aircrack, http://www.cr0.net:8040/code/network/aircrack/
  • 38
    • 85027141847 scopus 로고    scopus 로고
    • Dwepcrack, http://www.e.kth.se/~pvz/wifi/
    • Dwepcrack
  • 39
    • 85027109650 scopus 로고    scopus 로고
    • Weplab, http://weplab.sourceforge.net/
  • 40


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.