Back to Results
First PageMeta Content
Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Related-key attack / ICE / Weak key / Permutation / Initialization vector / Cryptography / Stream ciphers / RC4


Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2 1 2
Add to Reading List

Document Date: 2006-02-21 14:40:46


Open Document

File Size: 273,98 KB

Share Result on Facebook

City

San Jose / /

Company

Adi Shamir2 1 2 Cisco Systems Inc. / KSA / /

Country

United States / /

/

Event

Product Recall / Product Issues / FDA Phase / /

Facility

The Weizmann Institute / /

IndustryTerm

efficient algorithm / deployed encryption systems / broadcast applications / software applications / wireless networks / cryptanalytic applications / /

NaturalFeature

different streams / /

Organization

Weizmann Institute / /

Person

Ron Rivest / Scott Fluhrer / /

Product

key attack / RC4 / /

ProvinceOrState

Saskatchewan / California / /

Technology

encryption / WEP / efficient algorithm / secret key / SSL / Wired Equivalent Privacy protocol / key scheduling algorithm / stream cipher / /

SocialTag