{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,6]],"date-time":"2025-12-06T04:55:17Z","timestamp":1764996917037},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642204647"},{"type":"electronic","value":"9783642204654"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-20465-4_20","type":"book-chapter","created":{"date-parts":[[2011,5,2]],"date-time":"2011-05-02T14:42:47Z","timestamp":1304347367000},"page":"343-363","source":"Crossref","is-referenced-by-count":20,"title":["Statistical Attack on RC4"],"prefix":"10.1007","author":[{"given":"Pouyan","family":"Sepehrdad","sequence":"first","affiliation":[]},{"given":"Serge","family":"Vaudenay","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Vuagnoux","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","unstructured":"ANSI\/IEEE standard 802.11i, Amendment\u00a06 Wireless LAN Medium Access Control (MAC) and Physical Layer (phy) Specifications, Draft 3. IEEE (2003)"},{"key":"20_CR2","unstructured":"IEEE Std 802.11, Standards for Local and Metropolitan Area Networks: Wireless Lan Medium Access Control (MAC) and Physical Layer (PHY) Specifications (1999)"},{"key":"20_CR3","unstructured":"IEEE\u00a0802.1\u00a0WG. 802.1x: Standards for Local and Metropolitan Area Networks: Port-Based Access Control. IEEE (2001)"},{"key":"20_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"270","DOI":"10.1007\/978-3-540-71039-4_17","volume-title":"Fast Software Encryption","author":"E. Biham","year":"2008","unstructured":"Biham, E., Carmeli, Y.: Efficient Reconstruction of RC4 Keys from Internal States. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 270\u2013288. Springer, Heidelberg (2008)"},{"key":"20_CR5","unstructured":"Bittau, A.: Additional Weak IV Classes for the FMS Attack (2003)"},{"key":"20_CR6","unstructured":"Chaabouni, R.: Breaking WEP Faster with Statistical Analysis. Semester project. In: EPFL\/LASEC (2006)"},{"key":"20_CR7","unstructured":"Ferguson, N.: Michael: an Improved MIC for 802.11 WEP. IEEE doc. 802.11-2\/020r0 (2002)"},{"key":"20_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/3-540-44706-7_2","volume-title":"Fast Software Encryption","author":"S.R. Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., McGrew, D.A.: Statistical Analysis of the Alleged RC4 Keystream Generator. In: Schneier, B. (ed.) FSE 2000. LNCS, vol.\u00a01978, pp. 19\u201330. Springer, Heidelberg (2001)"},{"key":"20_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/3-540-45537-X_1","volume-title":"Selected Areas in Cryptography","author":"S.R. Fluhrer","year":"2001","unstructured":"Fluhrer, S.R., Mantin, I., Shamir, A.: Weaknesses in the Key Scheduling Algorithm of RC4. In: Vaudenay, S., Youssef, A.M. (eds.) SAC 2001. LNCS, vol.\u00a02259, pp. 1\u201324. Springer, Heidelberg (2001)"},{"key":"20_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/10718964_18","volume-title":"Information Security and Privacy","author":"J.D. Golic","year":"2000","unstructured":"Golic, J.D.: Iterative Probabilistic Cryptanalysis of RC4 Keystream Generator. In: Clark, A., Boyd, C., Dawson, E.P. (eds.) ACISP 2000. LNCS, vol.\u00a01841, pp. 220\u2013223. Springer, Heidelberg (2000)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1007\/3-540-69053-0_16","volume-title":"Advances in Cryptology - EUROCRYPT \u201997","author":"J.D.. Goli\u0107","year":"1997","unstructured":"Goli\u0107, J.D.: Linear Statistical Weakness of Alleged RC4 Keystream Generator. In: Fumy, W. (ed.) EUROCRYPT 1997. LNCS, vol.\u00a01233, pp. 226\u2013238. Springer, Heidelberg (1997)"},{"key":"20_CR12","unstructured":"Housley, R., Whiting, D., Ferguson, N.: Alternate Temporal Key Hash. IEEE doc. 802.11-02\/282r2 (2002)"},{"key":"20_CR13","unstructured":"Hulton, D.: Practical Exploitation of RC4 Weaknesses in WEP Environments (2001), \n                    \n                      http:\/\/www.dachb0den.com\/projects\/bsd-airtools\/wepexp.txt"},{"key":"20_CR14","unstructured":"Jenkins, R.: ISAAC and RC4 (1996), \n                    \n                      http:\/\/burtleburtle.net\/bob\/rand\/isaac.html"},{"key":"20_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-540-39887-5_18","volume-title":"Fast Software Encryption","author":"P. Junod","year":"2003","unstructured":"Junod, P., Vaudenay, S.: Optimal Key Ranking Procedures in a Statistical Cryptanalysis. In: Johansson, T. (ed.) FSE 2003. LNCS, vol.\u00a02887, pp. 235\u2013246. Springer, Heidelberg (2003)"},{"key":"20_CR16","doi-asserted-by":"publisher","first-page":"269","DOI":"10.1007\/s10623-008-9206-6","volume":"48","author":"A. Klein","year":"2008","unstructured":"Klein, A.: Attacks on the RC4 Stream Cipher. Design, Codes, and Cryptography\u00a048, 269\u2013286 (2008)","journal-title":"Design, Codes, and Cryptography"},{"key":"20_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-49649-1_26","volume-title":"Advances in Cryptology - ASIACRYPT\u201998","author":"L.R. Knudsen","year":"1998","unstructured":"Knudsen, L.R., Meier, W., Preneel, B., Rijmen, V., Verdoolaege, S.: Analysis Methods for (Alleged) RC4. In: Ohta, K., Pei, D. (eds.) ASIACRYPT 1998. LNCS, vol.\u00a01514, pp. 327\u2013341. Springer, Heidelberg (1998)"},{"key":"20_CR18","unstructured":"Korek: Next Generation of WEP Attacks? (2004), \n                    \n                      http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=%35"},{"key":"20_CR19","unstructured":"Korek: Need Security Pointers (2004)"},{"key":"20_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-540-71039-4_16","volume-title":"Fast Software Encryption","author":"S. Maitra","year":"2008","unstructured":"Maitra, S., Paul, G.: New Form of Permutation Bias and Secret Key Leakage in Keystream Bytes of RC4. In: Nyberg, K. (ed.) FSE 2008. LNCS, vol.\u00a05086, pp. 253\u2013269. Springer, Heidelberg (2008)"},{"key":"20_CR21","unstructured":"Mantin, I.: Analysis of the Stream Cipher RC4 (2001), \n                    \n                      http:\/\/www.wisdom.weizmann.ac.il\/~itsik\/RC4\/rc4.html"},{"key":"20_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"491","DOI":"10.1007\/11426639_29","volume-title":"Advances in Cryptology \u2013 EUROCRYPT 2005","author":"I. Mantin","year":"2005","unstructured":"Mantin, I.: Predicting and Distinguishing Attacks on RC4 Keystream Generator. In: Cramer, R. (ed.) EUROCRYPT 2005. LNCS, vol.\u00a03494, pp. 491\u2013506. Springer, Heidelberg (2005)"},{"key":"20_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1007\/3-540-45473-X_13","volume-title":"Fast Software Encryption","author":"I. Mantin","year":"2002","unstructured":"Mantin, I., Shamir, A.: A Practical Attack on Broadcast RC4. In: Matsui, M. (ed.) FSE 2001. LNCS, vol.\u00a02355, pp. 152\u2013164. Springer, Heidelberg (2002)"},{"key":"20_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"342","DOI":"10.1007\/11502760_23","volume-title":"Fast Software Encryption","author":"A. Maximov","year":"2005","unstructured":"Maximov, A.: Two Linear Distinguishing Attacks on VMPC and RC4A and Weakness. In: Gilbert, H., Handschuh, H. (eds.) FSE 2005. LNCS, vol.\u00a03557, pp. 342\u2013358. Springer, Heidelberg (2005)"},{"key":"20_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"297","DOI":"10.1007\/978-3-540-85174-5_17","volume-title":"Advances in Cryptology \u2013 CRYPTO 2008","author":"A. Maximov","year":"2008","unstructured":"Maximov, A., Khovratovich, D.: New State Recovery Attack on RC4. In: Wagner, D. (ed.) CRYPTO 2008. LNCS, vol.\u00a05157, pp. 297\u2013316. Springer, Heidelberg (2008)"},{"key":"20_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/3-540-45708-9_20","volume-title":"Advances in Cryptology - CRYPTO 2002","author":"I. Mironov","year":"2002","unstructured":"Mironov, I.: Not So Random Shuffles of RC4. In: Yung, M. (ed.) CRYPTO 2002. LNCS, vol.\u00a02442, pp. 304\u2013319. Springer, Heidelberg (2002)"},{"key":"20_CR27","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1145\/997122.997132","volume":"8","author":"V. Moen","year":"2004","unstructured":"Moen, V., Raddum, H., Hole, K.J.: Weaknesses in the Temporal Key Hash of WPA. Mobile Computing and Communications Review\u00a08, 76\u201383 (2004)","journal-title":"Mobile Computing and Communications Review"},{"key":"20_CR28","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"360","DOI":"10.1007\/978-3-540-77360-3_23","volume-title":"Selected Areas in Cryptography","author":"G. Paul","year":"2007","unstructured":"Paul, G., Maitra, S.: Permutation After RC4 Key Scheduling Reveals the Secret. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 360\u2013377. Springer, Heidelberg (2007)"},{"key":"20_CR29","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-540-25937-4_16","volume-title":"Fast Software Encryption","author":"S. Paul","year":"2004","unstructured":"Paul, S., Preneel, B.: A New Weakness in the RC4 Keystream Generator and an Approach. In: Roy, B., Meier, W. (eds.) FSE 2004. LNCS, vol.\u00a03017, pp. 245\u2013259. Springer, Heidelberg (2004)"},{"key":"20_CR30","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/s10623-008-9177-7","volume":"49","author":"G. Paul","year":"2008","unstructured":"Paul, G., Rathi, S., Maitra, S.: On Non-Negligible Bias of the First Output Byte of RC4 towards the First Three Bytes of the Secret Key. Design, Codes, and Cryptography\u00a049, 123\u2013134 (2008)","journal-title":"Design, Codes, and Cryptography"},{"key":"20_CR31","doi-asserted-by":"crossref","unstructured":"Postel, J., Reynolds, J.: A Standard for the Transmission of IP Datagrams over IEEE\u00a0802 Networks. RFC\u00a01042 (1988)","DOI":"10.17487\/rfc1042"},{"key":"20_CR32","unstructured":"Roos, A.: A Class of Weak Keys in RC4 Stream Cipher (sci.crypt) (1995), \n                    \n                      http:\/\/groups.google.com\/group\/sci.crypt.research\/msg\/078a%a9249d76eacc?dmode=source"},{"key":"20_CR33","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-642-19574-7_5","volume-title":"Selected Areas in Cryptography","author":"P. Sepehrdad","year":"2011","unstructured":"Sepehrdad, P., Vaudenay, S., Vuagnoux, M.: Discovery and Exploitation of New Biases in RC4. In: Biryukov, A., Gong, G., Stinson, D.R. (eds.) SAC 2010. LNCS, vol.\u00a06544, pp. 74\u201391. Springer, Heidelberg (2011)"},{"key":"20_CR34","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1145\/1514274.1514286","volume-title":"Proceedings of the Second ACM Conference on Wireless Network Security WISEC 2009","author":"E. Tews","year":"2009","unstructured":"Tews, E., Beck, M.: Practical Attacks Against WEP and WPA. In: Proceedings of the Second ACM Conference on Wireless Network Security WISEC 2009, Zurich, Switzerland, pp. 79\u201386. ACM, New York (2009)"},{"key":"20_CR35","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1007\/978-3-540-77535-5_14","volume-title":"Information Security Applications","author":"E. Tews","year":"2008","unstructured":"Tews, E., Weinmann, R.-P., Pyshkin, A.: Breaking 104 Bit WEP in Less Than 60 Seconds. In: Kim, S., Yung, M., Lee, H.-W. (eds.) WISA 2007. LNCS, vol.\u00a04867, pp. 188\u2013202. Springer, Heidelberg (2008)"},{"key":"20_CR36","doi-asserted-by":"crossref","first-page":"1715","DOI":"10.1016\/j.ins.2006.10.010","volume":"177","author":"V. Tomasevic","year":"2007","unstructured":"Tomasevic, V., Bojanic, S., Nieto-Taladriz, O.: Finding an Internal State of RC4 Stream Cipher. Information Sciences: an International Journal\u00a0177, 1715\u20131727 (2007)","journal-title":"Information Sciences: an International Journal"},{"key":"20_CR37","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"344","DOI":"10.1007\/978-3-540-77360-3_22","volume-title":"Selected Areas in Cryptography","author":"S. Vaudenay","year":"2007","unstructured":"Vaudenay, S., Vuagnoux, M.: Passive\u2013only key recovery attacks on RC4. In: Adams, C., Miri, A., Wiener, M. (eds.) SAC 2007. LNCS, vol.\u00a04876, pp. 344\u2013359. Springer, Heidelberg (2007)"},{"key":"20_CR38","unstructured":"Wagner, D.: Weak Keys in RC4 (sci.crypt) (1995), \n                    \n                      http:\/\/www.cs.berkeley.edu\/~daw\/my-posts\/my-rc4-weak-keys"}],"container-title":["Lecture Notes in Computer Science","Advances in Cryptology \u2013 EUROCRYPT 2011"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-20465-4_20.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:58:18Z","timestamp":1606186698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-20465-4_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642204647","9783642204654"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-20465-4_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2011]]}}}