메뉴 건너뛰기




Volumn , Issue , 2015, Pages 113-128

Attacks only get better: Password recovery attacks against RC4 in TLS

Author keywords

[No Author keywords available]

Indexed keywords

BAYESIAN NETWORKS; CRYPTOGRAPHY; HTTP; INFERENCE ENGINES; RECOVERY; SEEBECK EFFECT;

EID: 85076270691     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (40)

References (22)
  • 1
    • 0043232732 scopus 로고    scopus 로고
    • Users are not the enemy
    • Dec
    • ADAMS, A., AND SASSE, M. A. Users are not the enemy. Com-mun. ACM 42, 12 (Dec. 1999), 40–46.
    • (1999) Com-Mun. ACM , vol.42 , Issue.12 , pp. 40-46
    • Adams, A.1    Sasse, M.A.2
  • 4
    • 84878356177 scopus 로고    scopus 로고
    • The science of guessing: Analyzing an anonymized corpus of 70 million passwords
    • 21-23 May 2012, San Francisco, California, USA IEEE Computer Society
    • BONNEAU, J. The science of guessing: Analyzing an anonymized corpus of 70 million passwords. In IEEE Symposium on Security and Privacy, SP 2012, 21-23 May 2012, San Francisco, California, USA (2012), IEEE Computer Society, pp. 538–552.
    • (2012) IEEE Symposium on Security and Privacy, SP 2012 , pp. 538-552
    • Bonneau, J.1
  • 5
    • 79958097346 scopus 로고    scopus 로고
    • The password thicket: Technical and market failures in human authentication on the web
    • Harvard University, Cambridge, MA, USA, June 7 8
    • BONNEAU, J., AND PREIBUSCH, S. The password thicket: Technical and market failures in human authentication on the web. In 9th Annual Workshop on the Economics of Information Security, WEIS 2010, Harvard University, Cambridge, MA, USA, June 7 - 8 (2010).
    • (2010) 9th Annual Workshop on the Economics of Information Security, WEIS 2010
    • Bonneau, J.1    Preibusch, S.2
  • 10
    • 84974666258 scopus 로고    scopus 로고
    • Statistical analysis of the alleged RC4 keystream generator
    • B. Schneier, Ed., 1978 of Lecture Notes in Computer Science, Springer
    • FLUHRER, S. R., AND MCGREW, D. Statistical analysis of the alleged RC4 keystream generator. In FSE (2000), B. Schneier, Ed., vol. 1978 of Lecture Notes in Computer Science, Springer, pp. 19–30.
    • (2000) FSE , pp. 19-30
    • Fluhrer, S.R.1    McGrew, D.2
  • 14
    • 24944554565 scopus 로고    scopus 로고
    • Predicting and distinguishing attacks on RC4 keystream generator
    • R. Cramer, Ed.,. of Lecture Notes in Computer Science, Springer
    • MANTIN, I. Predicting and distinguishing attacks on RC4 keystream generator. In EUROCRYPT (2005), R. Cramer, Ed., vol. 3494 of Lecture Notes in Computer Science, Springer, pp. 491–506.
    • (2005) EUROCRYPT , vol.3494 , pp. 491-506
    • Mantin, I.1
  • 15
    • 84958972140 scopus 로고    scopus 로고
    • A practical attack on broadcast RC4
    • M. Matsui, Ed.,. of Lecture Notes in Computer Science, Springer
    • MANTIN, I., AND SHAMIR, A. A practical attack on broadcast RC4. In FSE (2001), M. Matsui, Ed., vol. 2355 of Lecture Notes in Computer Science, Springer, pp. 152–164.
    • (2001) FSE , vol.2355 , pp. 152-164
    • Mantin, I.1    Shamir, A.2
  • 16
    • 84902580282 scopus 로고    scopus 로고
    • How to recover any byte of plaintext on RC4
    • Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (2013), T. Lange, K. E. Lauter, and Lisonek, Eds.,. of Lecture Notes in Computer Science, Springer
    • OHIGASHI, T., ISOBE, T., WATANABE, Y., AND MORII, M. How to recover any byte of plaintext on RC4. In Selected Areas in Cryptography - SAC 2013 - 20th International Conference, Burnaby, BC, Canada, August 14-16, 2013, Revised Selected Papers (2013), T. Lange, K. E. Lauter, and P. Lisonek, Eds., vol. 8282 of Lecture Notes in Computer Science, Springer, pp. 155–173.
    • Selected Areas in Cryptography - SAC 2013 - 20th International Conference , vol.8282 , pp. 155-173
    • Ohigashi, T.1    Isobe, T.2    Watanabe, Y.3    Morii, M.4
  • 19
    • 84894899538 scopus 로고    scopus 로고
    • Non-) random sequences from (non-) random permutations – Analysis of RC4 stream cipher
    • SEN GUPTA, S., MAITRA, S., PAUL, G., AND SARKAR, S. (Non-) random sequences from (non-) random permutations – analysis of RC4 stream cipher. Journal of Cryptology 27, 1 (2012), 67–108.
    • (2012) Journal of Cryptology , vol.27 , Issue.1 , pp. 67-108
    • Sen Gupta, S.1    Maitra, S.2    Paul, G.3    Sarkar, S.4
  • 20
    • 78650022232 scopus 로고    scopus 로고
    • Testing metrics for password creation policies by attacking large sets of revealed passwords
    • Chicago, Illinois, USA, October 4-8, 2010 (2010), E. Al-Shaer, A. D. Keromytis, and Shmatikov, Eds., ACM
    • WEIR, M., AGGARWAL, S., COLLINS, M. P., AND STERN, H. Testing metrics for password creation policies by attacking large sets of revealed passwords. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010 (2010), E. Al-Shaer, A. D. Keromytis, and V. Shmatikov, Eds., ACM, pp. 162–175.
    • Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS 2010 , pp. 162-175
    • Weir, M.1    Aggarwal, S.2    Collins, M.P.3    Stern, H.4
  • 21
    • 12844275960 scopus 로고    scopus 로고
    • Password memorability and security: Empirical results
    • Sept
    • YAN, J., BLACKWELL, A., ANDERSON, R., AND GRANT, A. Password Memorability and Security: Empirical Results. IEEE Security and Privacy 2, 5 (Sept. 2004), 25–31.
    • (2004) IEEE Security and Privacy , vol.2 , Issue.5 , pp. 25-31
    • Yan, J.1    Blackwell, A.2    Anderson, R.3    Grant, A.4
  • 22
    • 0033277446 scopus 로고    scopus 로고
    • Password security: An empirical study
    • Mar
    • ZVIRAN, M., AND HAGA, W. J. Password Security: An Empirical Study. J. Manage. Inf. Syst. 15, 4 (Mar. 1999), 161–185.
    • (1999) J. Manage. Inf. Syst. , vol.15 , Issue.4 , pp. 161-185
    • Zviran, M.1    Haga, W.J.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.