Impossible fault analysis of RC4 and differential fault analysis of RC4

被引:0
|
作者
Biham, E [1 ]
Granboulan, L
Nguyên, PQ
机构
[1] Technion Israel Inst Technol, Dept Comp Sci, IL-32000 Haifa, Israel
[2] Ecole Normale Super, DI, CNRS, F-75005 Paris, France
来源
FAST SOFTWARE ENCRYPTION | 2005年 / 3557卷
关键词
D O I
暂无
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
In this paper we introduce the notion of impossible fault analysis, and present an impossible fault analysis of RC4, whose complexity 2(21) is smaller than the previously best known attack of Hoch and Shamir (2(26)), along with an even faster fault analysis of RC4, based on different 16 ideas, with complexity smaller than 2(16).
引用
收藏
页码:359 / 367
页数:9
相关论文
共 50 条
  • [31] The analysis of the number of fixed points in the key extending algorithm of RC4
    Xu Kejian
    He Liang
    Dai Zhaopeng
    Fan Xiubin
    SCIENCE IN CHINA SERIES A-MATHEMATICS, 2008, 51 (03): : 407 - 415
  • [32] Further non-randomness in RC4, RC4A and VMPC
    Santanu Sarkar
    Cryptography and Communications, 2015, 7 : 317 - 330
  • [33] Previously Overlooked Bias Signatures for RC4
    Hammood, Maytham M.
    Yoshigoe, Kenji
    2016 4TH INTERNATIONAL SYMPOSIUM ON DIGITAL FORENSIC AND SECURITY (ISDFS), 2016, : 101 - 106
  • [34] Metabolomics Analysis for Nitrite Degradation by the Metabolites of Limosilactobacillus fermentum RC4
    Xia, Chaoran
    Tian, Qiyuan
    Kong, Lingyu
    Sun, Xiaoqian
    Shi, Jingjing
    Zeng, Xiaoqun
    Pan, Daodong
    FOODS, 2022, 11 (07)
  • [35] Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
    Maitra, Subhamoy
    Paul, Goutam
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 27 - +
  • [36] The analysis of the number of fixed points in the key extending algorithm of RC4
    XU KeJian~(1+) HE Liang~1 DAI ZhaoPeng~1 FAN XiuBin~2 1 College of Mathematics
    ScienceinChina(SeriesA:Mathematics), 2008, (03) : 407 - 415
  • [37] An analysis of the RC4 family of stream ciphers against algebraic attacks
    Wong, Kenneth Koon-Ho
    Carter, Gary
    Dawson, Ed
    Conferences in Research and Practice in Information Technology Series, 2010, 105 : 67 - 74
  • [38] RC4 Encryption-A Literature Survey
    Jindal, Poonam
    Singh, Brahmjit
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON INFORMATION AND COMMUNICATION TECHNOLOGIES, ICICT 2014, 2015, 46 : 697 - 705
  • [39] Statistical Attack on RC4 Distinguishing WPA
    Sepehrdad, Pouyan
    Vaudenay, Serge
    Vuagnoux, Martin
    ADVANCES IN CRYPTOLOGY - EUROCRYPT 2011, 2011, 6632 : 343 - 363
  • [40] Analysis of RC4 Crypts Using PSO Based Swarm Technique
    Din, Maiya
    Pal, Saibal K.
    Muttoo, S. K.
    HARMONY SEARCH AND NATURE INSPIRED OPTIMIZATION ALGORITHMS, 2019, 741 : 1049 - 1056