Sciweavers

3 search results - page 1 / 1
» On Non-randomness of the Permutation After RC4 Key Schedulin...
Sort
View
AAECC
2007
Springer
105views Algorithms» more  AAECC 2007»
13 years 11 months ago
On Non-randomness of the Permutation After RC4 Key Scheduling
Abstract. Here we study a weakness of the RC4 Key Scheduling Algorithm (KSA) that has already been noted by Mantin and Mironov. Consider the RC4 permutation S of N (usually 256) by...
Goutam Paul, Subhamoy Maitra, Rohit Srivastava
FSE
2008
Springer
103views Cryptology» more  FSE 2008»
13 years 7 months ago
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4
Consider the permutation S in RC4. Roos pointed out in 1995 that after the Key Scheduling Algorithm (KSA) of RC4, each of the initial bytes of the permutation, i.e., S[y] for smal...
Subhamoy Maitra, Goutam Paul
ISPASS
2005
IEEE
13 years 11 months ago
Anatomy and Performance of SSL Processing
A wide spectrum of e-commerce (B2B/B2C), banking, financial trading and other business applications require the exchange of data to be highly secure. The Secure Sockets Layer (SSL...
Li Zhao, Ravi R. Iyer, Srihari Makineni, Laxmi N. ...