Weaknesses in the Key Scheduling Algorithm of RC4
GPTKB entity
Statements (17)
| Predicate | Object |
|---|---|
| gptkbp:instanceOf |
gptkb:cryptography_research_topic
|
| gptkbp:cause |
WEP protocol vulnerabilities
attacks on WPA-TKIP |
| gptkbp:describes |
key recovery attacks
biases in RC4 key scheduling insecure initial bytes in RC4 output |
| gptkbp:proposedBy |
RC4 should not be used for new cryptographic designs
|
| gptkbp:publishedIn |
Proceedings of Selected Areas in Cryptography 2001
|
| gptkbp:relatedTo |
gptkb:RC4
Key Scheduling Algorithm |
| gptkbp:result |
non-uniform key stream
predictable output bytes |
| gptkbp:studiedBy |
Fluhrer, Mantin, and Shamir
|
| gptkbp:bfsParent |
gptkb:Scott_Fluhrer
gptkb:FMS_attack |
| gptkbp:bfsLayer |
7
|
| https://www.w3.org/2000/01/rdf-schema#label |
Weaknesses in the Key Scheduling Algorithm of RC4
|