New State Recovery Attack on RC4
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Statistical attack on RC4 distinguishing WPA
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Attack on broadcast RC4 revisited
FSE'11 Proceedings of the 18th international conference on Fast software encryption
On the (in)security of stream ciphers based on arrays and modular addition
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
Towards a general RC4-Like keystream generator
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
A Distinguishing Attack on a Fast Software-Implemented RC4-Like Stream Cipher
IEEE Transactions on Information Theory
Cryptanalysis of RC4(n, m) stream cipher
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
In this paper we study the GGHN stream cipher presented in CISC 2005. This cipher has been motivated from RC4 with the idea to obtain further speed-up by considering word-oriented keystream output instead of byte-oriented ones. We prove that there exist a large number of short cycles of length equal to the length of the state array used in the cipher. Then towards having a theoretical analysis of GGHN type evolution, we study a randomized model of this cipher. Using Markovian process, we show how this model evolves to all zero state much faster than what is expected in an ideal scenario.