메뉴 건너뛰기




Volumn 2, Issue 3, 2008, Pages 257-289

A complete characterization of the evolution of RC4 pseudo random generation algorithm

Author keywords

Cryptanalysis; Distinguishing attacks; RC4; Statistical distributions; Stream cipher

Indexed keywords


EID: 79953284100     PISSN: 18622976     EISSN: 18622984     Source Type: Journal    
DOI: 10.1515/JMC.2008.012     Document Type: Article
Times cited : (19)

References (18)
  • 1
    • 24944460863 scopus 로고
    • last accessed June 4, 2008 September
    • H. Finney, An RC4 cycle that can't happen, available at http://www.wisdom. weizmann.ac.il/~itsik/RC4/rc4.html, September 1994, last accessed June 4, 2008.
    • (1994) An RC4 Cycle That Can't Happen
    • Finney, H.1
  • 2
    • 84949223752 scopus 로고    scopus 로고
    • Weaknesses in the Key Scheduling Algorithm of RC4. SAC 2001
    • Springer-Verlag
    • S. R. Fluhrer, I. Mantin, and A. Shamir, Weaknesses in the Key Scheduling Algorithm of RC4. SAC 2001, Lecture Notes in Computer Science, pp. 1-24. Springer-Verlag, 2001.
    • (2001) Lecture Notes in Computer Science , pp. 1-24
    • Fluhrer, S.R.1    Mantin, I.2    Shamir, A.3
  • 3
    • 38349034222 scopus 로고    scopus 로고
    • last accessed June 4, 2008
    • R. J. Jenkins, ISAAC and RC4, available at http://burtleburtle.net/bob/ rand/isaac.html, 1996, last accessed June 4, 2008.
    • (1996) ISAAC and RC4
    • Jenkins, R.J.1
  • 4
    • 58549109725 scopus 로고    scopus 로고
    • last accessed June 4, 2008
    • A. Klein, Attacks on the RC4 stream cipher, available at http://www.cdc. informatik.tu-darmstadt.de/aircrack-ptw/, 2005, last accessed June 4, 2008.
    • (2005) Attacks on the RC4 Stream Cipher
    • Klein, A.1
  • 6
    • 50249171695 scopus 로고    scopus 로고
    • New form of permutation bias and secret key leakage in Keystream bytes of RC4
    • SpringerVerlag
    • S. Maitra and G. Paul, New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. FSE 2008, Lecture Notes in Computer Science 5086, pp. 253-269. SpringerVerlag, 2008.
    • (2008) FSE 2008, Lecture Notes in Computer Science , vol.5086 , pp. 253-269
    • Maitra, S.1    Paul, G.2
  • 8
    • 24944554565 scopus 로고    scopus 로고
    • Predicting and distinguishing attacks on RC4 keystream generator
    • Advances in Cryptology - EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques. Proceedings
    • -, Predicting and Distinguishing Attacks on RC4 Keystream Generator. EUROCRYPT 2005, Lecture Notes in Computer Science 3494, pp. 491-506. Springer-Verlag, 2005. (Pubitemid 41313971)
    • (2005) Lecture Notes in Computer Science , vol.3494 , pp. 491-506
    • Mantin, I.1
  • 12
    • 51349098856 scopus 로고    scopus 로고
    • On Non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key
    • extended version to appear in Designs, Codes and Cryptography, DOI 10.1007/s10623-008-9177-7
    • G. Paul, S. Rathi, and S. Maitra, On Non-negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. WCC 2007, pp. 285-294, 2007, extended version to appear in Designs, Codes and Cryptography, DOI 10.1007/s10623-008-9177-7.
    • (2007) WCC 2007 , pp. 285-294
    • Paul, G.1    Rathi, S.2    Maitra, S.3
  • 13
    • 26444620896 scopus 로고    scopus 로고
    • A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher
    • Springer-Verlag
    • S. Paul and B. Preneel, A New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher. FSE 2004, Lecture Notes in Computer Science 3017, pp. 245-259. Springer-Verlag, 2004.
    • (2004) FSE 2004, Lecture Notes in Computer Science , vol.3017 , pp. 245-259
    • Paul, S.1    Preneel, B.2
  • 16
    • 33846288293 scopus 로고    scopus 로고
    • Finding an internal state of RC4 stream cipher
    • DOI 10.1016/j.ins.2006.10.010, PII S0020025506003203, Fuzzy set applications in Industrial Engineering
    • V. Tomasevic, S. Bojanic, and O. Nieto-Taladriz, Finding an internal state of RC4 stream cipher, Information Sciences 177 (2007), pp. 1715-1727. (Pubitemid 46110986)
    • (2007) Information Sciences , vol.177 , Issue.7 , pp. 1715-1727
    • Tomasevic, V.1    Bojanic, S.2    Nieto-Taladriz, O.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.