Slide 55
Slide 55 text
References I
[ABP+13] Nadhem J. AlFardan, Daniel J. Bernstein, Keneth G. Paterson, Bertram Poettering, and Jacob C. N. Schuldt.
On the Security of RC4 in TLS.
In USENIX Security Symposium 2013, 2013.
[GMM+14] Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, and Santanu Sarkar.
Dependence in IV-related bytes of RC4 key enhances vulnerabilities in WPA.
In Carlos Cid and Christian Rechberger, editors, Fast Software Encryption - FSE 2014, volume 8540 of Lecture Notes in Computer Science,
pages 350–369. Springer Berlin Heidelberg, 2014.
[IM18] Ryoma Ito and Atsuko Miyaji.
New Iterated RC4 Key Correlations.
In Willy Susilo and Guomin Yang, editors, Information Security and Privacy - ACISP 2018, volume 10946 of Lecture Notes in Computer
Science, pages 154–171. Springer International Publishing, 2018.
[IOWM13] Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, and Masakatu Morii.
Full Plaintext Recovery Attack on Broadcast RC4.
In Shiho Moriai, editor, Fast Software Encryption - FSE 2013, volume 8424 of Lecture Notes in Computer Science. Springer Berlin
Heidelberg, 2013.
[MS01] Itsik Mantin and Adi Shamir.
Practical Attack on Broadcast RC4.
In Mitsuru Matsui, editor, Fast Software Encryption - FSE 2001, volume 2355 of Lecture Notes in Computer Science, pages 152–164.
Springer Berlin Heidelberg, 2001.
[PPS14] Kenneth G. Paterson, Bertram Poettering, and Jacob C.N. Schuldt.
Plaintext Recovery Attacks Against WPA/TKIP.
In Carlos Cid and Christian Rechberger, editors, Fast Software Encryption - FSE 2014, volume 8540 of Lecture Notes in Computer Science,
pages 325–349. Springer Berlin Heidelberg, 2014.
[VP15] Mathy Vanhoef and Frank Piessens.
All Your Biases Belong to Us: Breaking RC4 in WPA-TKIP and TLS.
In USENIX Security Symposium 2015, pages 97–112, 2015.
[VP16] Mathy Vanhoef and Frank Piessens.
Predicting, Decrypting, and Abusing WPA2/802.11 Group Keys.
In USENIX Security Symposium 2016, 2016.
ҏ౻ཽഅ (େࡕେֶ) ෮ੑͷ͋Δݤ૬ؔΛ༻͍ͨ WPA-TKIP ʹର͢Δฏจճ෮߈ܸ 2018. 7. 26 36 / 36