Security analysis of the RC4+ stream cipher

S Banik, S Sarkar, R Kacker - … Conference on Cryptology in India, Mumbai …, 2013 - Springer
The RC4+ stream cipher was proposed by Maitra and Paul at Indocrypt 2008. The authors
had claimed that RC4+ ironed out most of the weaknesses of the alleged RC4 stream cipher …

Refined construction of RC4 key setting in WPA

R Ito, A Miyaji - IEICE Transactions on Fundamentals of Electronics …, 2017 - search.ieice.org
The RC4 stream cipher is widely used including WEP and WPA, which are the security
protocols for IEEE 802.11 wireless standard. WPA improved a construction of the RC4 key …

New iterated RC4 key correlations and their application to plaintext recovery on WPA-TKIP

R Ito, A Miyaji - IEICE Transactions on Fundamentals of Electronics …, 2021 - search.ieice.org
This paper presents new key correlations of the keystream bytes generated from RC4 and
their application to plaintext recovery on WPA-TKIP. We first observe new key correlations …

New Linear Correlations related to State Information of RC4 PRGA using IV in WPA

R Ito, A Miyaji - International Workshop on Fast Software Encryption, 2015 - Springer
RC4 is a stream cipher designed by Ron Rivest in 1987, and is widely used in various
applications. WPA is one of these applications, where TKIP is used for a key generation …

Refined glimpse correlations of RC4

R Ito, A Miyaji - IEICE Transactions on Fundamentals of Electronics …, 2016 - search.ieice.org
RC4 stream cipher, designed by Rivest in 1987, is widely used in various standard protocols
and commercial applications. After the disclosure of RC4 algorithm in 1994, many …

Refined RC4 key correlations of internal states in WPA

R Ito, A Miyaji - IEICE Transactions on Fundamentals of Electronics …, 2016 - search.ieice.org
WPA is the security protocol for IEEE 802.11 wireless networks standardized as a substitute
for WEP in 2003, and uses RC4 stream cipher for encryption. It improved a 16-byte RC4 key …

How TKIP induces biases of internal states of generic RC4

R Ito, A Miyaji - Australasian Conference on Information Security and …, 2015 - Springer
RC4, designed by Rivest, is widely used including WPA, which is one of the security
protocols for IEEE 802.11 wireless standard. The first 3-byte RC4 keys in WPA generated by …

Some Studies on Selected Stream Ciphers Analysis Fault Attack & Related Results

S Banik - 2015 - search.proquest.com
Abstract Stream Ciphers are important Symmetric Cryptological primitives, built for the
purpose of providing secure message encryption. As no formal security proofs exist, our …

New integrated long-term glimpse of RC4

R Ito, A Miyaji - … Applications: 15th International Workshop, WISA 2014 …, 2015 - Springer
RC4, which was designed by Ron Rivest in 1987, is widely used in various applications
such as SSL/TLS, WEP, WPA, etc. In 1996, Jenkins discovered correlations between one …

[PDF][PDF] A study on Statistical Cryptanalysis of Stream

伊藤, 竜馬 - 2019 - ir.library.osaka-u.ac.jp
A stream cipher is often used as a cryptographic scheme for processing communication data
at a high speed. Therefore, it is important to evaluate the security of stream ciphers in …