Cryptanalysis of RC4-like Ciphers
SAC '98 Proceedings of the Selected Areas in Cryptography
Analysis Methods for (Alleged) RCA
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
A Practical Attack on Broadcast RC4
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
(Not So) Random Shuffles of RC4
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
A New Keystream Generator MUGI
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Networking: wireless (In)security
Sys Admin
Securing Wireless Networks in a University Environment
PERCOMW '05 Proceedings of the Third IEEE International Conference on Pervasive Computing and Communications Workshops
Information Assurance: Dependability and Security in Networked Systems
Information Assurance: Dependability and Security in Networked Systems
Network Security: Know It All: Know It All
Network Security: Know It All: Know It All
Research on a Novel Hashing Stream Cipher
Computational Intelligence and Security
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Fast Software Encryption
Efficient Reconstruction of RC4 Keys from Internal States
Fast Software Encryption
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
New Results on the Key Scheduling Algorithm of RC4
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Fragility of the Robust Security Network: 802.11 Denial of Service
ACNS '09 Proceedings of the 7th International Conference on Applied Cryptography and Network Security
NordSec '09 Proceedings of the 14th Nordic Conference on Secure IT Systems: Identity and Privacy in the Internet Age
OS X Exploits and Defense: Own it...Just Like Windows or Linux!
OS X Exploits and Defense: Own it...Just Like Windows or Linux!
Improving users' security choices on home wireless networks
Proceedings of the Sixth Symposium on Usable Privacy and Security
WiFi and WiMAX secure deployments
Journal of Computer Systems, Networks, and Communications - Special issue on WiMAX, LTE, and WiFi interworking
Cryptography for network security: failures, successes and challenges
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Generalized RC4 key collisions and hash collisions
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Intelligent jamming in wireless networks with applications to 802.11b and other networks
MILCOM'06 Proceedings of the 2006 IEEE conference on Military communications
Goal-oriented security threat mitigation patterns: a case of credit card theft mitigation
Proceedings of the 16th Conference on Pattern Languages of Programs
Mutual preimage authentication for fast handover in enterprise networks
OTM'10 Proceedings of the 2010 international conference on On the move to meaningful internet systems - Volume Part I
Design and optimization of the videoweb wireless camera network
Journal on Image and Video Processing - Special issue on multicamera information processing: acquisition, collaboration, interpretation, and production
Discovery and exploitation of new biases in RC4
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Critique of the related-key attack concept
Designs, Codes and Cryptography
RC42's innovative way for data security in wireless data communication
International Journal of Information and Computer Security
Journal of Parallel and Distributed Computing
Statistical attack on RC4 distinguishing WPA
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
ACNS'11 Proceedings of the 9th international conference on Applied cryptography and network security
A new practical key recovery attack on the stream cipher RC4 under related-key model
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Robust watermarking of compressed JPEG images in encrypted domain
Transactions on data hiding and multimedia security VI
Non-randomness in eSTREAM candidates salsa20 and TSC-4
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
RC4-hash: a new hash function based on RC4
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
Towards the Systematic Development of Medical Networking Technology
Journal of Medical Systems
802.11 de-authentication attack detection using genetic programming
EuroGP'06 Proceedings of the 9th European conference on Genetic Programming
New applications of time memory data tradeoffs
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
A practical attack on the fixed RC4 in the WEP mode
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
FMS attack-resistant WEP implementation is still broken
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Impossible fault analysis of RC4 and differential fault analysis of RC4
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Towards a general RC4-Like keystream generator
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Security analysis of michael: the IEEE 802.11i message integrity code
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A sophisticated solution for revealing attacks on wireless LAN
TrustBus'06 Proceedings of the Third international conference on Trust, Privacy, and Security in Digital Business
ECRYPT: the cryptographic research challenges for the next decade
SCN'04 Proceedings of the 4th international conference on Security in Communication Networks
Resistance of SNOW 2.0 against algebraic attacks
CT-RSA'05 Proceedings of the 2005 international conference on Topics in Cryptology
An integrated scheme for intrusion detection in WLAN
ICOIN'06 Proceedings of the 2006 international conference on Information Networking: advances in Data Communications and Wireless Networks
CAWAnalyser: enhancing wireless intrusion response with runtime context-awareness
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part I
Predicting and distinguishing attacks on RC4 keystream generator
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A new class of RC4 colliding key pairs with greater hamming distance
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
Key recovery attacks of practical complexity on AES-256 variants with up to 10 rounds
EUROCRYPT'10 Proceedings of the 29th Annual international conference on Theory and Applications of Cryptographic Techniques
Proof of empirical RC4 biases and new key correlations
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-48 Rev. 1. Guide to Securing Legacy IEEE 802.11 Wireless Networks
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
SP 800-97. Establishing Wireless Robust Security Networks: A Guide to IEEE 802.11i
On a framework for energy-efficient security protocols in wireless networks
Computer Communications
Stream cipher for binary image encryption using Ant Colony Optimization based key generation
Applied Soft Computing
FSH scheme for high-speed handover and anti-MITM on mobile computing
The Journal of Supercomputing
On the security of IV dependent stream ciphers
FSE'07 Proceedings of the 14th international conference on Fast Software Encryption
Differential attacks against stream cipher ZUC
ASIACRYPT'12 Proceedings of the 18th international conference on The Theory and Application of Cryptology and Information Security
Contemporary Issues in Handheld Computing Research
International Journal of Handheld Computing Research
Security-aware optimization for ubiquitous computing systems with SEAT graph approach
Journal of Computer and System Sciences
IEEE 802.11 chipset fingerprinting by the measurement of timing characteristics
AISC '11 Proceedings of the Ninth Australasian Information Security Conference - Volume 116
MaD2: an ultra-performance stream cipher for pervasive data encryption
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
FPS'12 Proceedings of the 5th international conference on Foundations and Practice of Security
Practical verification of WPA-TKIP vulnerabilities
Proceedings of the 8th ACM SIGSAC symposium on Information, computer and communications security
A Probability Problem Arising from the Security of the Temporal Key Hash of WPA
Wireless Personal Communications: An International Journal
POSTER: Critique of the CISSP common body of knowledge of cryptography
Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security
Authenticated key agreement in wireless networks with automated key management
Proceedings of the 6th International Conference on Security of Information and Networks
Cryptanalysis of RC4(n, m) stream cipher
Proceedings of the 6th International Conference on Security of Information and Networks
SEC'13 Proceedings of the 22nd USENIX conference on Security
Proving empirical key-correlations in RC4
Information Processing Letters
An Investigation of Security Trends in Personal Wireless Networks
Wireless Personal Communications: An International Journal
Hi-index | 0.00 |
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with non-negligible probability. We use these weak keys to construct new distinguishers for RC4, and to mount related key attacks with practical complexities. Finally, we show that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard), in which a fixed secret key is concatenated with known IV modifiers in order to encrypt different messages. Our new passive ciphertext-only attack on this mode can recover an arbitrarily long key in a negligible amount of time which grows only linearly with its size, both for 24 and 128 bit IV modifiers.