Sciweavers

2 search results - page 1 / 1
» A Practical Attack on the Fixed RC4 in the WEP Mode
Sort
View
ASIACRYPT
2005
Springer
13 years 10 months ago
A Practical Attack on the Fixed RC4 in the WEP Mode
In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also kno...
Itsik Mantin
SACRYPT
2001
Springer
123views Cryptology» more  SACRYPT 2001»
13 years 9 months ago
Weaknesses in the Key Scheduling Algorithm of RC4
Abstract. Inthis paper we present several weaknesses in the keyscheduling algorithm of RC4, and describe their cryptanalytic signi cance. We identify a large number of weak keys, i...
Scott R. Fluhrer, Itsik Mantin, Adi Shamir