Show simple item record

dc.contributor.authorGrosul, Alexander
Wallach, Dan S.
dc.date.accessioned 2017-08-02T22:02:47Z
dc.date.available 2017-08-02T22:02:47Z
dc.date.issued 2000-06-08
dc.identifier.urihttps://hdl.handle.net/1911/96275
dc.description.abstract In this paper we present analysis of the RC4 stream cipher and show that for each 2048-bit key there exists a family of related keys, differing in one of the byte positions. The keystreams generated by RC4 for a key and its related keys are substantially similar in the initial hundred bytes before diverging. RC4 is most commonly used with a 128-bit key repeated 16 times;this variant does not suffer from the weaknesses we describe. We recommend that applications of RC4 with keys longer than 128 bits (and particularly those using the full 2048-bit keys) discard the initial 256 bytes of the keystream output.
dc.format.extent 13 pp
dc.language.iso eng
dc.rights You are granted permission for the noncommercial reproduction, distribution, display, and performance of this technical report in any format, but this permission is only for a period of forty-five (45) days from the most recent time that you verified that this technical report is still available from the Computer Science Department of Rice University under terms that include this permission. All other rights are reserved by the author(s).
dc.title A Related-Key Cryptanalysis of RC4
dc.type Technical report
dc.date.note June 8, 2000
dc.identifier.digital TR00-358
dc.type.dcmi Text
dc.identifier.citation Grosul, Alexander and Wallach, Dan S.. "A Related-Key Cryptanalysis of RC4." (2000) https://hdl.handle.net/1911/96275.


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record