Slide 44
Slide 44 text
References I
[FMS01] Scott Fluhrer, Itsik Mantin, and Adi Shamir.
Weaknesses in the Key Scheduling Algorithm of RC4.
In Serge Vaudenay and Amr M. Youssef, editors, Selected Areas in Cryptography - SAC 2001, volume 2259 of Lecture Notes in Computer
Science, pages 1–24. Springer Berlin Heidelberg, 2001.
[GMM+14] Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, and Santanu Sarkar.
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA.
In Carlos Cid and Christian Rechberger, editors, Fast Software Encryption - FSE 2014, volume 8540 of Lecture Notes in Computer Science,
pages 350–369. Springer Berlin Heidelberg, 2014.
[IOWM13] Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, and Masakatu Morii.
Full Plaintext Recovery Attack on Broadcast RC4.
In Shiho Moriai, editor, Fast Software Encryption - FSE 2013, volume 8424 of Lecture Notes in Computer Science. Springer Berlin
Heidelberg, 2013.
[PPS14] Kenneth G. Paterson, Bertram Poettering, and Jacob C.N. Schuldt.
Plaintext Recovery Attacks Against WPA/TKIP.
In Carlos Cid and Christian Rechberger, editors, Fast Software Encryption - FSE 2014, volume 8540 of Lecture Notes in Computer Science,
pages 325–349. Springer Berlin Heidelberg, 2014.
[Sar14] Santanu Sarkar.
Proving Empirically key-correlations in RC4.
Information Processing Letters, 114 (5):234–238, 2014.
R. Ito & A. Miyaji (Osaka University) New Iterated RC4 Key Correlations July 12, 2018 27 / 27