نتایج جستجو برای: رمز رشته ای rc4

تعداد نتایج: 247422  

2015
Simon Campbell Andrew Ker

The RC4 stream cipher is used to protect messages from eavesdroppers in many settings, including some of the Transport Layer Security (TLS) protocols used to secure much internet traffic. Nonuniformities in the output of a stream cipher are a weakness that an eavesdropper can exploit to gain information about the encrypted messages. In this report we verify the size of some nonuniformities of R...

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه رازی - دانشکده علوم 1392

امنیت اطلاعات یکی از مسائل با اهمیت پدافندی در مقابله با حمله مهاجمان به حریم اطلاعات با ارزش سازمان می باشد. یکی از ابزارهای قدرتمند پدافند غیر عامل در راستای تأمین امنیت اطلاعات و ارتباطات، علم رمزنگاری می باشد. موضوع پایان نامه، کاربردی از دنباله های فوق آشوب اصلاح شده در رمزنگاری تصویر است. سیستم به کار برده شده یک سیستم چهار بعدی است که به کمک الگوریتم رونگ- کوتا مرتبه چهار با مقدارهای اول...

Journal: :The Winnower 2015

Journal: :The Winnower 2015

Journal: :The Winnower 2015

Journal: :The Winnower 2015

Journal: :IACR Cryptology ePrint Archive 2007
Goutam Paul Subhamoy Maitra Rohit Srivastava

Here we study a weakness of the RC4 Key Scheduling Algorithm (KSA) that has already been noted by Mantin and Mironov. Consider the RC4 permutation S of N (usually 256) bytes and denote it by SN after the KSA. Under reasonable assumptions we present a simple proof that each permutation byte after the KSA is significantly biased (either positive or negative) towards many values in the range 0, . ...

2009
Mitsuru Matsui

This paper studies “colliding keys” of RC4 that create the same initial state and hence generate the same pseudo-random byte stream. It is easy to see that RC4 has colliding keys when its key size is very large, but it was unknown whether such key collisions exist for shorter key sizes. We present a new state transition sequence of the key scheduling algorithm for a related key pair of an arbit...

2005
Itsik Mantin

In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4 in several modes. Our main result is a practical key recovery attack on RC4 when an IV modifier is concatenated to the beginning of a secret roo...

2014
Sourav Sengupta Subhamoy Maitra Willi Meier Goutam Paul Santanu Sarkar

The first three bytes of the RC4 key in WPA are public as they are derived from the public parameter IV, and this derivation leads to a strong mutual dependence between the first two bytes of the RC4 key. In this paper, we provide a disciplined study of RC4 biases resulting specifically in such a scenario. Motivated by the work of AlFardan et al. (2013), we first prove the interesting sawtooth ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید