Heuristics: intelligent search strategies for computer problem solving
Heuristics: intelligent search strategies for computer problem solving
A Practical Attack on Broadcast RC4
FSE '01 Revised Papers from the 8th International Workshop on Fast Software Encryption
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Impossible fault analysis of RC4 and differential fault analysis of RC4
FSE'05 Proceedings of the 12th international conference on Fast Software Encryption
Predicting and distinguishing attacks on RC4 keystream generator
EUROCRYPT'05 Proceedings of the 24th annual international conference on Theory and Applications of Cryptographic Techniques
OWA trees and their role in security modeling using attack trees
Information Sciences: an International Journal
The linear complexity of new generalized cyclotomic binary sequences of order four
Information Sciences: an International Journal
Cryptographic properties of some binary generalized cyclotomic sequences with the length p2
Information Sciences: an International Journal
Finding the differential characteristics of block ciphers with neural networks
Information Sciences: an International Journal
Finding the differential characteristics of block ciphers with neural networks
Information Sciences: an International Journal
Recovering RC4 Permutation from 2048 Keystream Bytes if j Is Stuck
ACISP '08 Proceedings of the 13th Australasian conference on Information Security and Privacy
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Effective uses of FPGAs for brute-force attack on RC4 ciphers
IEEE Transactions on Very Large Scale Integration (VLSI) Systems
Studies on the distribution of the shortest linear recurring sequences
Information Sciences: an International Journal
On Some Sequences of the Secret Pseudo-random Index j in RC4 Key Scheduling
AAECC-18 '09 Proceedings of the 18th International Symposium on Applied Algebra, Algebraic Algorithms and Error-Correcting Codes
Discovery and exploitation of new biases in RC4
SAC'10 Proceedings of the 17th international conference on Selected areas in cryptography
Statistical attack on RC4 distinguishing WPA
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Some combinatorial results towards state recovery attack on RC4
ICISS'11 Proceedings of the 7th international conference on Information Systems Security
Hi-index | 0.07 |
The RC4 is a stream cipher widely deployed in software applications due to its simplicity and efficiency. The paper presents a cryptanalytic attack that employs the tree representation of this cipher and introduces an abstraction in the form of general conditions for managing the information about its internal state. In order to find the initial state, the tree of general conditions is searched applying the hill-climbing strategy. The complexity of this attack is lower than that of an exhaustive search. The attack is derived from a general cryptanalytic approach for a class of table-shuffling ciphers, whose next-state function permutes the table entries. Incorporating the general conditions in the existing backtracking algorithm, the estimated complexity of the cryptanalytic attack is decreased below the best published result but the RC4 still remains a quite secure cipher in practice.