Abstract
RC4 is the most widely deployed stream cipher in software applications. In this paper we describe a major statistical weakness in RC4, which makes it trivial to distinguish between short outputs of RC4 and random strings by analyzing their second bytes. This weakness can be used to mount a practical ciphertext-only attack on RC4in some broadcast applications, in which the same plaintext is sent to multiple recipients under different keys.
Cite
CITATION STYLE
Mantin, I., & Shamir, A. (2002). A practical attack on broadcast RC4. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 2355, pp. 152–164). Springer Verlag. https://doi.org/10.1007/3-540-45473-X_13
Register to see more suggestions
Mendeley helps you to discover research relevant for your work.