[图书][B] Stream ciphers
A Klein - 2013 - Springer
Cryptographic ciphers come in two flavours: symmetric (AES, etc.) and asymmetric (RSA,
etc.). The symmetric ciphers are further divided into block ciphers and stream ciphers. Block …
etc.). The symmetric ciphers are further divided into block ciphers and stream ciphers. Block …
Spritz---a spongy RC4-like stream cipher and hash function.
RL Rivest, JCN Schuldt - Cryptology ePrint Archive, 2016 - eprint.iacr.org
This paper reconsiders the design of the stream cipher RC4, and proposes an improved
variant, which we call``Spritz''(since the output comes in fine drops rather than big blocks.) …
variant, which we call``Spritz''(since the output comes in fine drops rather than big blocks.) …
High-performance hardware implementation for RC4 stream cipher
RC4 is the most popular stream cipher in the domain of cryptology. In this paper, we present
a systematic study of the hardware implementation of RC4, and propose the fastest known …
a systematic study of the hardware implementation of RC4, and propose the fastest known …
Discovery and exploitation of new biases in RC4
In this paper, we present several weaknesses in the stream cipher RC4. First, we present a
technique to automatically reveal linear correlations in the PRGA of RC4. With this method …
technique to automatically reveal linear correlations in the PRGA of RC4. With this method …
(Non-) random sequences from (non-) random permutations—Analysis of RC4 stream cipher
RC4 has been the most popular stream cipher in the history of symmetric key cryptography.
Its internal state contains a permutation over all possible bytes from 0 to 255, and it attempts …
Its internal state contains a permutation over all possible bytes from 0 to 255, and it attempts …
Analysis of RC4 and proposal of additional layers for better security margin
In this paper, the RC4 Key Scheduling Algorithm (KSA) is theoretically studied to reveal non-
uniformity in the expected number of times each value of the permutation is touched by the …
uniformity in the expected number of times each value of the permutation is touched by the …
Full plaintext recovery attack on broadcast RC4
T Isobe, T Ohigashi, Y Watanabe, M Morii - International Workshop on Fast …, 2013 - Springer
This paper investigates the practical security of RC4 in broadcast setting where the same
plaintext is encrypted with different user keys. We introduce several new biases in the initial …
plaintext is encrypted with different user keys. We introduce several new biases in the initial …
Statistical attack on RC4: distinguishing WPA
In this paper we construct several tools for manipulating pools of biases in the analysis of
RC4. Then, we show that optimized strategies can break WEP based on 4 000 packets by …
RC4. Then, we show that optimized strategies can break WEP based on 4 000 packets by …