2008
DOI: 10.1093/ietfec/e91-a.1.3
|View full text |Cite
|
Sign up to set email alerts
|

New Weakness in the Key-Scheduling Algorithm of RC4

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2008
2008
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(2 citation statements)
references
References 17 publications
0
2
0
Order By: Relevance
“…We can read it is a chosen plain text attack. The FMS attack has been extended to use more weak IV classes by several researchers [4]- [7]. Tews, Weinmann, and Pyshkin have proposed a key recovery attack against WEP without using any weak IV in 2007 (called the PTW attack [8]).…”
Section: Introductionmentioning
confidence: 99%
“…We can read it is a chosen plain text attack. The FMS attack has been extended to use more weak IV classes by several researchers [4]- [7]. Tews, Weinmann, and Pyshkin have proposed a key recovery attack against WEP without using any weak IV in 2007 (called the PTW attack [8]).…”
Section: Introductionmentioning
confidence: 99%
“…a) E-mail: teramura@stu.kobe-u.ac.jp DOI: 10.1587/transfun.E94.A. 10 ing Algorithm (KSA) was finished (called initial state) [17]- [20]. They used the relational equations between an initial state and a secret key for these attacks.…”
Section: Introductionmentioning
confidence: 99%