10,568 research outputs found
RC4 Encryption-A Literature Survey
AbstractA chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in this paper. We have summarized the various weaknesses of RC4 algorithm followed by the recently proposed enhancements available in the literature. It is established that innovative research efforts are required to develop secure RC4 algorithm, which can remove the weaknesses of RC4, such as biased bytes, key collisions, and key recovery attacks on WPA. These flaws in RC4 are still offering an open challenge for developers. Hence our chronological survey corroborates the fact that even though researchers are working on RC4 stream cipher since last two decades, it still offers a plethora of research issues. The attraction of community towards RC4 is still alive
A practical attack on the fixed RC4 in the wep mode
Abstract. In this paper we revisit a known but ignored weakness of the RC4 keystream generator, where secret state info leaks to the generated keystream, and show that this leakage, also known as Jenkins’ correlation or the RC4 glimpse, can be used to attack RC4 in several modes. Our main result is a practical key recovery attack on RC4 when an IV modifier is concatenated to the beginning of a secret root key to generate a session key. As opposed to the WEP attack from [FMS01] the new attack is applicable even in the case where the first 256 bytes of the keystream are thrown and its complexity grows only linearly with the length of the key. In an exemplifying parameter setting the attack recoversa16-bytekeyin2 48 steps using 2 17 short keystreams generated from different chosen IVs. A second attacked mode is when the IV succeeds the secret root key. We mount a key recovery attack that recovers the secret root key by analyzing a single word from 2 22 keystreams generated from different IVs, improving the attack from [FMS01] on this mode. A third result is an attack on RC4 that is applicable when the attacker can inject faults to the execution of RC4. The attacker derives the internal state and the secret key by analyzing 2 14 faulted keystreams generated from this key
Recommended from our members
Identifying reverse 3PL performance critical success factors
The reverse and third party logistics operational process is now well known and established to be a vital component of modern day supply chain and product / service-based organizations (Marasco, 2007). Apart from being a vital component of such enterprises, many researchers and practitioners have also been noting the importance of this approach and its impact on customer service, satisfaction, profitability and other key performance indicators (Autry et al., 2001). However, studies relating to reverse 3PL performance are still limited. This research attempts to examine the factors that influence the reverse logistics performance within 3PL, within a specific case study organization in Thailand, which aims to add to work carried out relating to such operations in this part of the world such as by Bhatnagar et al. (1999). This research uses a combination of a qualitative case study along with a quantitative approach (Fuzzy Cognitive Mapping) to model and analyse the constructs which underpin the dynamics involved within a 3PL scenario. As such, both the combined approaches are based upon the development and testing of a hypothesis via empirical primary and computational data. Hence, using extant literature, and combined qualitative and quantitative research approaches, the paper identifies significant and pertinent critical success factors for reverse 3PL performance (centred around the indogenous/exogenous relationship between information systems, resource commitment and organizational structure). The paper also explores the deep inter-relationships involved within 3PL operations using the Fuzzy Cognitive Mapping technique, contributing to the existing literature on reverse 3PL and performant supply chains, and identifying critical success factors and underlying determinants of reverse 3PL of use to those industry and investigating the area from an academic perspective
- …