نتایج جستجو برای: رمز رشته ای rc4

تعداد نتایج: 247422  

Journal: :IACR Cryptology ePrint Archive 2013
Santanu Sarkar Sourav Sengupta Goutam Paul Subhamoy Maitra

After a series of works on RC4 cryptanalysis in last few years (published in flagship cryptology conferences and journals), the most significant (and also very recent) attack on the cipher has been the discovery of vulnerabilities in the SSL/TLS protocol, by AlFardan, Bernstein, Paterson, Poettering and Schuldt. They ran extensive computations to identify significant short-term single-byte keys...

2006
Donghoon Chang Kishan Chand Gupta Mridul Nandi

In this paper, we propose a new hash function based on RC4 and we call it RC4-Hash. This proposed hash function produces variable length hash output from 16 bytes to 64 bytes. Our RC4-Hash has several advantages over many popularly known hash functions. Its efficiency is comparable with widely used known hash function (e.g., SHA-1). Seen in the light of recent attacks on MD4, MD5, SHA-0, SHA-1 ...

Journal: :Procedia Computer Science 2015

2000
Jesse Walker Jesse R. Walker

The IEEE 802.11 standard [1] defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. The goal of WEP is to provide data privacy to the level of a wired network. The 802.11 design community generally concedes that the WEP encapsulation fails to meet its design goal, but widely attributes this failure to WEP’s use of 40-bit RC4 (see [2] or [3] for a description of RC4) ...

2000
Jesse Walker Jesse R. Walker

The IEEE 802.11 standard [1] defines the Wired Equivalent Privacy, or WEP, encapsulation of 802.11 data frames. The goal of WEP is to provide data privacy to the level of a wired network. The 802.11 design community generally concedes that the WEP encapsulation fails to meet its design goal, but widely attributes this failure to WEP’s use of 40-bit RC4 (see [2] or [3] for a description of RC4) ...

Journal: :The Winnower 2015

Journal: :IACR Cryptology ePrint Archive 2003
Marina Pudovkina

RC4 cipher is the most widely used stream cipher in software applications. It was designed by R. Rivest in 1987. In this paper we find the number of keys of the RC4 cipher generating initial permutations with the same cycle structure. We obtain that the distribution of initial permutations is not uniform.

Journal: :Des. Codes Cryptography 2008
Andreas Klein

In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described in [2] in such a way, that it will work, if the weak keys described in that paper are avoided. A further attack will work even if the first 256 Byte of the output remain unused. Finally we show that variants of the RC4 algorithm like NGG and RC4A are also...

2005
Yukiyasu Tsunoo Teruo Saito Hiroyasu Kubo Maki Shigeri Tomoyasu Suzaki Takeshi Kawabata

This paper reports the greater bias found in the output sequence of VMPC, a modified RC4 stream cipher proposed in 2004. Using the bias with approximately 2 output bytes allows us to distinguish VMPC from truly random sequence. Distinguishing attack can also break RC4A, an algorihm based on RC4, more efficiently than any existing attacks. With about 2 output bytes, distinguishing attack makes i...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه صنعتی اصفهان - دانشکده برق و کامپیوتر 1388

تحلیل الگوریتم های رمز دنباله ای خانواده a5/x، به دلیل نقش مهم و کلیدی آنها به عنوان واحد رمز کننده در استاندارد gsm، همواره مورد توجه بودهاند و در این میان الگوریتم a5/1 به عنوان الگوریتم اصلی و پایه رمزنگاری در این استاندارد شناخته می شود. اما از طرفی گسترش کاربری gsm به فراسوی مرزهای اروپا و از طرف دیگر محدودیت هایی که جهت انتقال این الگوریتم به خارج از خاک اروپا وجود داشت همه و همه سبب شدند...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید