Slide 32
Slide 32 text
References I
[IOWM13] Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, and Masakatu Morii.
Full Plaintext Recovery Attack on Broadcast RC4.
In Shiho Moriai, editor, Fast Software Encryption - FSE 2013, volume 8424 of Lecture Notes in Computer Science. Springer Berlin Heidelberg,
2013.
[MP08] Subhamoy Maitra and Goutam Paul.
New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4.
In Kaisa Nyberg, editor, Fast Software Encryption - FSE 2008, volume 5086 of Lecture Notes in Computer Science, pages 253–269. Springer
Berlin Heidelberg, 2008.
[Pop15] Andrey Popov.
Prohibiting RC4 cipher suites.
Internet Engineering Task Force - IETF, Request for Comments, 7465, February 2015.
[Sar14] Santanu Sarkar.
Proving Empirically key-correlations in RC4.
Information Processing Letters, 114 (5):234–238, 2014.
[SVV11] Pouyan Sepehrdad, Serge Vaudenay, and Martin Vuagnoux.
Discovery and Exploitation of New Biases in RC4.
In Alex Biryukov, Guang Gong, and Douglas R. Stinson, editors, Selected Areas in Cryptography - SAC 2010, volume 6544 of Lecture Notes in
Computer Science, pages 74–91. Springer Berlin Heidelberg, 2011.
[VP15] Mathy Vanhoef and Frank Piessens.
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS.
In USENIX Security Symposium 2015, pages 97–112, 2015.
[VV07] Serge Vaudenay and Martin Vuagnoux.
Passive – only Key Recovery Attack on RC4.
In Carlisle Adams, Ali Miri, and Michael Wiener, editors, Selected Areas in Cryptography - SAC 2007, volume 4876 of Lecture Notes in
Computer Science, pages 344–359. Springer Berlin Heidelberg, 2007.
ҏ౻ ཽഅ (େࡕେֶ) ετϦʔϜ҉߸ RC4 ʹ͓͚Δ෮ੑͷ͋Δ৽͍͠ݤ૬ؔ (SCIS 2018) 2018. 1. 24 32 / 32