Repository logo

Infoscience

  • English
  • French
Log In
Logo EPFL, École polytechnique fédérale de Lausanne

Infoscience

  • English
  • French
Log In
  1. Home
  2. Academic and Research Output
  3. Conferences, Workshops, Symposiums, and Seminars
  4. Passive-Only Key Recovery Attacks on RC4
 
conference paper

Passive-Only Key Recovery Attacks on RC4

Vaudenay, Serge  
•
Vuagnoux, Martin  
2007
Selected Areas in Cryptography. SAC 2007
SAC 2007

We present several weaknesses in the key scheduling algorithm of RC4 when the secret key contains an initialization vector - a cryptographic scheme typically used by the WEP and WPA protocols to protect IEEE 802.11 wireless communications. First, we show how the previously discovered key recovery attacks can be improved by reducing the dependency between the secret key bytes. Then, we describe two new weaknesses related to the modulo operation of the key scheduling algorithm. Finally, we describe a passive-only attack able to significantly improve the key recovery process on WEP with a data complexity of 2<sup>15</sup> eavesdropped packets.

  • Files
  • Details
  • Metrics
Loading...
Thumbnail Image
Name

VV07.pdf

Access type

openaccess

Size

187.67 KB

Format

Adobe PDF

Checksum (MD5)

339772e6327ae90a1f0f8f9b14aa3fc8

Logo EPFL, École polytechnique fédérale de Lausanne
  • Contact
  • infoscience@epfl.ch

  • Follow us on Facebook
  • Follow us on Instagram
  • Follow us on LinkedIn
  • Follow us on X
  • Follow us on Youtube
AccessibilityLegal noticePrivacy policyCookie settingsEnd User AgreementGet helpFeedback

Infoscience is a service managed and provided by the Library and IT Services of EPFL. © EPFL, tous droits réservés