The alleged RC4 keystream generator is examined, and a method of explicitly computing digraph probabilities is given. Using this method, we demonstrate a method for distinguishing 8-bit RC4 from randomness. Our method requires less keystream output than currently published attacks, requiring only 230:6 bytes of output. In addition, we observe that an attacker can, on occasion, determine portions of the in- ternal state with nontrivial probability. However, we are currently unable to extend this observation to a full attack.
CITATION STYLE
Fluhrer, S. R., & McGrew, D. A. (2001). Statistical analysis of the alleged RC4 keystream generator. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 1978, pp. 19–30). Springer Verlag. https://doi.org/10.1007/3-540-44706-7_2
Mendeley helps you to discover research relevant for your work.