Weaknesses in the Key Scheduling Algorithm of RC4

GPTKB entity

Statements (17)
Predicate Object
gptkbp:instanceOf cryptography research topic
gptkbp:cause WEP protocol vulnerabilities
attacks on WPA-TKIP
gptkbp:describes key recovery attacks
biases in RC4 key scheduling
insecure initial bytes in RC4 output
https://www.w3.org/2000/01/rdf-schema#label Weaknesses in the Key Scheduling Algorithm of RC4
gptkbp:proposedBy RC4 should not be used for new cryptographic designs
gptkbp:publishedIn Proceedings of Selected Areas in Cryptography 2001
gptkbp:relatedTo gptkb:RC4
Key Scheduling Algorithm
gptkbp:result non-uniform key stream
predictable output bytes
gptkbp:studiedBy Fluhrer, Mantin, and Shamir
gptkbp:bfsParent gptkb:Scott_Fluhrer
gptkb:FMS_attack
gptkbp:bfsLayer 7