“…The main directions of cryptanalysis in this area are 1. finding correlations between the keystream output bytes and the secret key [31,39,24,15] and key recovery in the IV mode [6,17,11,34,38] (these exploit the weaknesses of both the KSA and the PRGA), 2. recovering the RC4 permutation from the keystream output bytes [12,35,21] and 3. identifying distinguishers [16,29,18].…”