M. Lazar Stosic. International Journal of Advanced Computer Science and Applications(IJACSA), (2012)
Abstract
In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a variable size key, and strengths and weaknesses of the RCS stream cipher. Using examples from other papers, we show that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard).
%0 Journal Article
%1 IJACSA.2012.030319
%A Lazar Stosic, Milena Bogdanovic
%D 2012
%J International Journal of Advanced Computer Science and Applications(IJACSA)
%K KSA; RC4 WEP WEP; attack. cipher; of security stream
%N 3
%T RC4 stream cipher and possible attacks on WEP
%U http://ijacsa.thesai.org/
%V 3
%X In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a variable size key, and strengths and weaknesses of the RCS stream cipher. Using examples from other papers, we show that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard).
@article{IJACSA.2012.030319,
abstract = { In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a variable size key, and strengths and weaknesses of the RCS stream cipher. Using examples from other papers, we show that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard).},
added-at = {2014-02-21T08:00:08.000+0100},
author = {{Lazar Sto\v{s}ic}, Milena Bogdanovic},
biburl = {https://www.bibsonomy.org/bibtex/27ed890c8b992714c0c9f3f5c4b14c857/thesaiorg},
interhash = {a1ea3b75cb76a91fdc5fe239ae2dead4},
intrahash = {7ed890c8b992714c0c9f3f5c4b14c857},
journal = {International Journal of Advanced Computer Science and Applications(IJACSA)},
keywords = {KSA; RC4 WEP WEP; attack. cipher; of security stream},
number = 3,
timestamp = {2014-02-21T08:00:08.000+0100},
title = {{RC4 stream cipher and possible attacks on WEP}},
url = {http://ijacsa.thesai.org/},
volume = 3,
year = 2012
}