Back to Results
First PageMeta Content
ICE / Related-key attack / Fluhrer /  Mantin and Shamir attack / Wired Equivalent Privacy / Stream cipher / Initialization vector / Weak key / Cryptography / RC4 / Permutation


Weaknesses in the Key Scheduling Algorithm of RC4 Scott Fluhrer1 , Itsik Mantin2 , and Adi Shamir2
Add to Reading List

Document Date: 2012-12-01 17:41:53


Open Document

File Size: 297,10 KB

Share Result on Facebook

City

San Jose / /

Company

permutation SA / KSA / Adi Shamir2 1 Cisco Systems Inc. / /

/

Event

FDA Phase / Product Issues / Product Recall / /

Facility

The Weizmann Institute / /

IndustryTerm

deployed encryption systems / broadcast applications / software applications / cient algorithm / wireless networks / cryptanalytic applications / /

Organization

Weizmann Institute / /

Person

Ron Rivest / /

/

Product

msb / S0 / key attack / Lemma 1 / RC4 / /

ProvinceOrState

California / /

Technology

encryption / WEP / WEP Wired Equivalent Privacy protocol / key scheduling algorithm / secret key / Wired Equivalent Privacy protocol / Secure Socket Layer protocol / cient algorithm / stream cipher / /

SocialTag