نتایج جستجو برای: رمز رشته ای rc4
تعداد نتایج: 247422 فیلتر نتایج به سال:
A keystream generator, known as RC4, consisting of a permutation table that slowly varies in time under the control of itself, is analyzed by the linear model approach. The objective is to find linear relations among the keystream bits that hold with probability different from one half by using the linear sequential circuit approximation method. To estimate the corresponding correlation coeffic...
The Microsoft Windows 2000 implementation of Kerberos introduces a new encryption type based on the RC4 encryption algorithm and using an MD5 HMAC for checksum. This is offered as an alternative to using the existing DES-based encryption types. The RC4-HMAC encryption types are used to ease upgrade of existing Windows NT environments, provide strong cryptography (128-bit key lengths), and provi...
In this paper we present an attack that recovers the whole internal state of RC4 using a cache timing attack model first introduced in the cache timing attack of Osvik, Shamir and Tromer against some highly efficient AES implementations. In this model, the adversary can obtain some information related to the elements of a secret state used during the encryption process. Zenner formalized this m...
The involvement of autophagy in the cornea during the systemic inflammatory response elicited by intravenous administration of lipopolysaccharide (LPS) was investigated. Eight-week-old male Sprague-Dawley rats were injected i.v. with 15 mg/kg body weight LPS. RC4 rabbit corneal keratocytes were also used and treated with 100 ng/mL of tumor necrosis factor α (TNFα) and/or cycloheximide (CHX). Th...
The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto protocol standard for secured Internet and mobile applications. TLS supports several symmetric encryption options, including a scheme based on the RC4 stream cipher. In this paper, we present ciphertext-only plaintext recovery attack...
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance. We identify a large number of weak keys, in which knowledge of a small number of key bits suffices to determine many state and output bits with non-negligible probability. We use these weak keys to construct new distinguishers for RC4, and to mount related key attac...
باتوجه به پیشرفت سریع علم و فناوری در سالهای اخیر، شاخه های مختلف علم بیش از پیش از یکدیگر جدا شده اند. در نتیجه، ارتباط کمتری بین آنها وجود دارد. از طرف دیگر، حل مسائل پیچیده در قلمرو علم و فناوری نیاز به دیدگاه های جامع تری دارد. در سالهای اخیر توجه زیادی به مطالعات بین-رشته ای شده است، و با توجه به نیازهای مربوطه توسعه آموزش بی رشته ای نیز مورد توجه قرار گرفته است. ولی بکارگیری مقوله بین رشت...
In this paper, we introduce the concept of the derivative of sequence of numbers and define new statistical indices by which we discoverd new properties of randomly generated number sequences. We also build a test for pseudo random generators based on these properties and use it to confirm the weakness of RC4 key scheduling algorithm that has been reported in the litterature. In this rescpect w...
RC4-Based Hash Function is a new proposed hash function based on RC4 stream cipher for ultra low power devices. In this paper, we analyse the security of the function against collision attack. It is shown that the attacker can find collision and multi-collision messages with complexity only 6 compress function operations and negligible memory with time complexity 2. In addition,we show the hash...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید