Slide 25
Slide 25 text
References I
[ABP+13] Nadhem J. AlFardan, Daniel J. Bernstein, Keneth G. Paterson, Bertram Poettering, and Jacob C. N. Schuldt.
On the Security of RC4 in TLS.
In USENIX Security Symposium 2013, 2013.
[DMPS11] Apurba Das, Subhamoy Maitra, Goutam Paul, and Santanu Sarkar.
Some Combinatorial Results towards State Recovery Attack on RC4.
In Sushil Jajodia and Chandan Mazumdar, editors, Information Systems Security - ICISS 2011, volume 7093 of Lecture Notes in
Computer Science, pages 204–214. Springer Berlin Heidelberg, 2011.
[FMS01] Scott Fluhrer, Itsik Mantin, and Adi Shamir.
Weaknesses in the Key Scheduling Algorithm of RC4.
In Serge Vaudenay and Amr M. Youssef, editors, Selected Areas in Cryptography - SAC 2001, volume 2259 of Lecture Notes in
Computer Science, pages 1–24. Springer Berlin Heidelberg, 2001.
[GMM+14] Sourav Sen Gupta, Subhamoy Maitra, Willi Meier, Goutam Paul, and Santanu Sarkar.
Dependence in IV-related bytes of RC4 key enhances vulunerabilities in WPA.
In Fast Software Encryption - FSE 2014. To appear, 2014.
[GMPS11] Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, and Santanu Sarkar.
Proof of Empirical RC4 Biases and New Key Correlations.
In Ali Miri and Serge Vaudenay, editors, Selected Areas in Cryptography - SAC 2011, volume 7118 of Lecture Notes in Computer
Science, pages 151–168. Springer Berlin Heidelberg, 2011.
[IOWM14] Takanori Isobe, Toshihiro Ohigashi, Yuhei Watanabe, and Masakatu Morii.
Full Plaintext Recovery Attack on Broadcast RC4.
In Shiho Moriai, editor, Fast Software Encryption - FSE 2013, volume 8424 of Lecture Notes in Computer Science. Springer Berlin
Heidelberg, 2014.
[Jen96] R. J. Jenkins.
ISAAC and RC4.
http://burtleburtle.net/bob/rand/isaac.html, 1996.
[Kle08] Andreas Klein.
Attacks on the RC4 stream cipher.
Designs, Codes and Cryptography, 48(3):269–286, April 2008.
ҏ౻ ཽഅ (JAIST) WPA ʹ͓͚Δ RC4 ͷ෦ঢ়ଶʹؔ͢Δ৽͍͠ઢܗ૬ؔ (SCIS 2015) 2015. 1. 21 25 / 28