Foundations of Cryptography: Basic Tools
Foundations of Cryptography: Basic Tools
Cryptanalysis of RC4-like Ciphers
SAC '98 Proceedings of the Selected Areas in Cryptography
Analysis Methods for (Alleged) RCA
ASIACRYPT '98 Proceedings of the International Conference on the Theory and Applications of Cryptology and Information Security: Advances in Cryptology
Statistical Analysis of the Alleged RC4 Keystream Generator
FSE '00 Proceedings of the 7th International Workshop on Fast Software Encryption
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
A New Version of the Stream Cipher SNOW
SAC '02 Revised Papers from the 9th Annual International Workshop on Selected Areas in Cryptography
(Not So) Random Shuffles of RC4
CRYPTO '02 Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology
Distinguishing Attacks on SOBER-t16 and t32
FSE '02 Revised Papers from the 9th International Workshop on Fast Software Encryption
Cryptanalysis of the "Grain" family of stream ciphers
ASIACCS '06 Proceedings of the 2006 ACM Symposium on Information, computer and communications security
Finding an internal state of RC4 stream cipher
Information Sciences: an International Journal
Attacks on the RC4 stream cipher
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Differential Cryptanalysis of the Stream Ciphers Py, Py6 and Pypy
EUROCRYPT '07 Proceedings of the 26th annual international conference on Advances in Cryptology
New Attacks on the Stream Cipher TPy6 and Design of New Ciphers the TPy6-A and the TPy6-B
Research in Cryptology
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Fast Software Encryption
Efficient Reconstruction of RC4 Keys from Internal States
Fast Software Encryption
New State Recovery Attack on RC4
CRYPTO 2008 Proceedings of the 28th Annual conference on Cryptology: Advances in Cryptology
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
New Results on the Key Scheduling Algorithm of RC4
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
New Weakness in the Key-Scheduling Algorithm of RC4
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
New Correlations of RC4 PRGA Using Nonzero-Bit Differences
ACISP '09 Proceedings of the 14th Australasian Conference on Information Security and Privacy
Prevention of management frame attacks on 802.11 WLANs
International Journal of Wireless and Mobile Computing
Encryption System with Variable Number of Registers
Computers and Electrical Engineering
Improved Distinguishing Attacks on HC-256
IWSEC '09 Proceedings of the 4th International Workshop on Security: Advances in Information and Computer Security
Survey and benchmark of stream ciphers for wireless sensor networks
WISTP'07 Proceedings of the 1st IFIP TC6 /WG8.8 /WG11.2 international conference on Information security theory and practices: smart cards, mobile and ubiquitous computing systems
On non-randomness of the permutation after RC4 key scheduling
AAECC'07 Proceedings of the 17th international conference on Applied algebra, algebraic algorithms and error-correcting codes
Two trivial attacks on TRIVIUM
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
Permutation after RC4 key scheduling reveals the secret key
SAC'07 Proceedings of the 14th international conference on Selected areas in cryptography
An analysis of the RC4 family of stream ciphers against algebraic attacks
AISC '10 Proceedings of the Eighth Australasian Conference on Information Security - Volume 105
Generalized RC4 key collisions and hash collisions
SCN'10 Proceedings of the 7th international conference on Security and cryptography for networks
Discovery and exploitation of new biases in RC4
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Statistical attack on RC4 distinguishing WPA
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Attack on broadcast RC4 revisited
FSE'11 Proceedings of the 18th international conference on Fast software encryption
A new practical key recovery attack on the stream cipher RC4 under related-key model
Inscrypt'10 Proceedings of the 6th international conference on Information security and cryptology
Privacy-preserving outsourcing of brute-force key searches
Proceedings of the 3rd ACM workshop on Cloud computing security workshop
Robust watermarking of compressed JPEG images in encrypted domain
Transactions on data hiding and multimedia security VI
On the (in)security of stream ciphers based on arrays and modular addition
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
RC4-hash: a new hash function based on RC4
INDOCRYPT'06 Proceedings of the 7th international conference on Cryptology in India
A practical attack on the fixed RC4 in the WEP mode
ASIACRYPT'05 Proceedings of the 11th international conference on Theory and Application of Cryptology and Information Security
Distinguishing attacks on t-functions
Mycrypt'05 Proceedings of the 1st international conference on Progress in Cryptology in Malaysia
Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Impossible fault analysis of RC4 and differential fault analysis of RC4
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Towards a general RC4-Like keystream generator
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Cryptanalysis of the stream cipher DECIM
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Distinguishing attacks on the stream cipher py
FSE'06 Proceedings of the 13th international conference on Fast Software Encryption
Predicting and distinguishing attacks on RC4 keystream generator
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
A new class of RC4 colliding key pairs with greater hamming distance
ISPEC'10 Proceedings of the 6th international conference on Information Security Practice and Experience
MV3: a new word based stream cipher using rapid mixing and revolving buffers
CT-RSA'07 Proceedings of the 7th Cryptographers' track at the RSA conference on Topics in Cryptology
Cryptanalysis of the F-FCSR stream cipher family
SAC'05 Proceedings of the 12th international conference on Selected Areas in Cryptography
Weaknesses of COSvd (2,128) stream cipher
ICISC'05 Proceedings of the 8th international conference on Information Security and Cryptology
Proof of empirical RC4 biases and new key correlations
SAC'11 Proceedings of the 18th international conference on Selected Areas in Cryptography
Proceedings of the 5th ACM workshop on Security and artificial intelligence
New weaknesses in the keystream generation algorithms of the stream ciphers TPy and Py
ISC'07 Proceedings of the 10th international conference on Information Security
Cryptanalysis of WG-7: a lightweight stream cipher
Cryptography and Communications
Cryptanalysis of RC4(n, m) stream cipher
Proceedings of the 6th International Conference on Security of Information and Networks
SEC'13 Proceedings of the 22nd USENIX conference on Security
Resilience to distinguishing attacks on WG-7 cipher and their generalizations
Cryptography and Communications
Proving empirical key-correlations in RC4
Information Processing Letters
Hi-index | 0.00 |
RC4 is the most widely deployed stream cipher in software applications. In this paper we describe a major statistical weakness in RC4, which makes it trivial to distinguish between short outputs of RC4 and random strings by analyzing their second bytes. This weakness can be used to mount a practical ciphertext-only attack on RC4 in some broadcast applications, in which the same plaintext is sent to multiple recipients under different keys.