RC4 encryption-A literature survey

P Jindal, B Singh - Procedia Computer Science, 2015 - Elsevier
A chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in
this paper. We have summarized the various weaknesses of RC4 algorithm followed by the …

[图书][B] RC4 stream cipher and its variants

G Paul, S Maitra - 2011 - books.google.com
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software
stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 …

[图书][B] Stream ciphers

A Klein - 2013 - Springer
Cryptographic ciphers come in two flavours: symmetric (AES, etc.) and asymmetric (RSA,
etc.). The symmetric ciphers are further divided into block ciphers and stream ciphers. Block …

Spritz---a spongy RC4-like stream cipher and hash function.

RL Rivest, JCN Schuldt - Cryptology ePrint Archive, 2016 - eprint.iacr.org
This paper reconsiders the design of the stream cipher RC4, and proposes an improved
variant, which we call``Spritz''(since the output comes in fine drops rather than big blocks.) …

High-performance hardware implementation for RC4 stream cipher

SS Gupta, A Chattopadhyay, K Sinha… - IEEE Transactions …, 2012 - ieeexplore.ieee.org
RC4 is the most popular stream cipher in the domain of cryptology. In this paper, we present
a systematic study of the hardware implementation of RC4, and propose the fastest known …

Discovery and exploitation of new biases in RC4

P Sepehrdad, S Vaudenay, M Vuagnoux - International Workshop on …, 2010 - Springer
In this paper, we present several weaknesses in the stream cipher RC4. First, we present a
technique to automatically reveal linear correlations in the PRGA of RC4. With this method …

(Non-) random sequences from (non-) random permutations—Analysis of RC4 stream cipher

S Sen Gupta, S Maitra, G Paul, S Sarkar - Journal of Cryptology, 2014 - Springer
RC4 has been the most popular stream cipher in the history of symmetric key cryptography.
Its internal state contains a permutation over all possible bytes from 0 to 255, and it attempts …

Analysis of RC4 and proposal of additional layers for better security margin

S Maitra, G Paul - Progress in Cryptology-INDOCRYPT 2008: 9th …, 2008 - Springer
In this paper, the RC4 Key Scheduling Algorithm (KSA) is theoretically studied to reveal non-
uniformity in the expected number of times each value of the permutation is touched by the …

Full plaintext recovery attack on broadcast RC4

T Isobe, T Ohigashi, Y Watanabe, M Morii - International Workshop on Fast …, 2013 - Springer
This paper investigates the practical security of RC4 in broadcast setting where the same
plaintext is encrypted with different user keys. We introduce several new biases in the initial …

Statistical attack on RC4: distinguishing WPA

P Sepehrdad, S Vaudenay, M Vuagnoux - … International Conference on the …, 2011 - Springer
In this paper we construct several tools for manipulating pools of biases in the analysis of
RC4. Then, we show that optimized strategies can break WEP based on 4 000 packets by …