{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T13:45:45Z","timestamp":1725543945980},"publisher-location":"Dordrecht","reference-count":46,"publisher":"Springer Netherlands","isbn-type":[{"type":"print","value":"9789048136612"},{"type":"electronic","value":"9789048136629"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-90-481-3662-9_67","type":"book-chapter","created":{"date-parts":[[2010,1,30]],"date-time":"2010-01-30T11:23:45Z","timestamp":1264850625000},"page":"391-396","source":"Crossref","is-referenced-by-count":5,"title":["KSAm \u2013 An Improved RC4 Key-Scheduling Algorithm for Securing WEP"],"prefix":"10.1007","author":[{"given":"Bogdan","family":"Crainicu","sequence":"first","affiliation":[]},{"given":"Florian Mircea","family":"Boian","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,12,12]]},"reference":[{"key":"67_CR1","doi-asserted-by":"crossref","unstructured":"W. A. Arbaugh, N. Shankar, and Y. C. Justin Wan, \u201cYour 802.11 Wireless Network has No Clothes\u201d, IEEE Wireless Communications, Vol. 9, No. 6, pp. 44\u201351, 2002. Available: http:\/\/www.cs.umd.edu\/~waa\/wireless.pdf","DOI":"10.1109\/MWC.2002.1160080"},{"key":"67_CR2","unstructured":"A. Bittau, \u201cAdditional weak IV classes for the FMS attack\u201d, Department of Computer Science, University College London, 2003. Available: http:\/\/www.cs.ucl.ac.uk\/staff\/a.bittau\/sorwep.txt"},{"key":"67_CR3","doi-asserted-by":"crossref","unstructured":"A. Bittau, M. Handley, and J. Lackey, \u201cThe Final Nail in WEP\u2019s Coffin\u201d, in Proc. 2006 IEEE Symposium on Security and Privacy, S&P\u201906, pp. 386\u2013400, 2006. Available: http:\/\/tapir.cs.ucl.ac.uk\/bittau-wep.pdf","DOI":"10.1109\/SP.2006.40"},{"key":"67_CR4","doi-asserted-by":"crossref","unstructured":"N. Borisov, I. Goldberg, and D. Wagner, \u201cIntercepting mobile communications: The insecurity of 802.11\u201d, in. Proc. 7th Annual International Conference on Mobile Computing and Networking, MobiCom \u201801, Rome, pp. 180\u2013189, 2001. Available: http:\/\/www.cypherpunks.ca\/~iang\/pubs\/wep-mob01.pdf","DOI":"10.1145\/381677.381695"},{"key":"67_CR5","unstructured":"Diehard Battery of Tests of Randomness, G. Marsaglia, 1995. Available: http:\/\/stat.fsu.edu\/pub\/diehard \/"},{"key":"67_CR6","unstructured":"H. Finney, \u201cAn RC4 cycle that can\u2019t happen\u201d, Post in sci.crypt, September 1994"},{"key":"67_CR7","unstructured":"S. Fluhrer and D. McGrew, \u201cStatistical analysis of the alleged RC4 keystream Generator\u201d, in. Proc. 7th International Workshop, FSE 2000, New York, Lecture Notes in Computer Science, Vol. 1978, Springer-Verlag, pp. 66\u201371, 2001."},{"key":"67_CR8","unstructured":"S. Fluhrer, I. Mantin, and A. Shamir, \u201cWeaknesses in the key scheduling algorithm of RC4\u201d, in Proc. 8th Annual International Workshop, SAC 2001, Toronto, Lecture Notes in Computer Science, Vol. 2259, Springer-Verlag, pp. 1\u201324, 2001."},{"key":"67_CR9","unstructured":"S. Fluhrer, I. Mantin, and A. Shamir, \u201cAttacks on RC4 and WEP\u201d, CryptoBytes (RSA Laboratories), Vol. 5, No. 2, pp. 26\u201334, 2002. Available: http:\/\/www.rsa.com\/rsalabs\/cryptobytes\/cryptobytes_v5n2.pdf"},{"issue":"1\u20132","key":"67_CR10","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s000100300001","volume":"65","author":"D. Goldstein","year":"2003","unstructured":"D. Goldstein and D. Moews, \u201cThe identity is the most likely exchange shuffle for large n\u201d, Aequationes Mathematicae, Vol. 65, No. 1\u20132, pp. 3\u201330, 2003.","journal-title":"Aequationes Mathematicae"},{"key":"67_CR11","unstructured":"J. Dj. Golic, \u201cLinear statistical weakness of alleged RC4 keystream generator\u201d, in. Proc. International Conference on the Theory and Application of Cryptographic Techniques, EUROCRYPT \u201897, Konstanz, Lecture Notes in Computer Science, Vol. 1233, Springer-Verlag, pp. 226\u2013238, 1997."},{"key":"67_CR12","unstructured":"G. Gong, K. C. Gupta, M. Hell, and Y. Nawaz, \u201cTowards a General RC4-like Keystream Generator\u201d, in Proc. First SKLOIS Conference, CISC 2005, Beijing, Lecture Notes in Computer Science, Vol. 3822, Springer-Verlag, pp. 162\u2013174, 2005."},{"key":"67_CR13","unstructured":"A. Grosul and D. Wallach, \u201cA related key cryptanalysis of RC4\u201d, Technical Report TR-00\u2013358, Department of Computer Science, Rice University, 2000. Available: www.weizmann.ac.il\/mathusers\/itsik\/RC4\/Papers\/GrosulWallach.ps"},{"key":"67_CR14","unstructured":"D. Hulton, \u201cPractical exploitation of RC4 weaknesses in WEP environments\u201d, 2001. Available: http:\/\/www.datastronghold.com\/security-articles\/hacking-articles\/practical-exploitation-of-rc4-weaknesses-in-wep-environments.html"},{"key":"67_CR15","unstructured":"IEEE Standard for Information Technology-Telecommunications and information exchange between systems-Local and metropolitan area networks-Specific requirements, Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) Specifications, ANSI\/IEEE Std 802.11, 1999 Edition (R2003). Available: http:\/\/standards.ieee.org\/reading\/ieee\/std\/lanman \/"},{"key":"67_CR16","unstructured":"R. Jenkins, \u201cIsaac and RC4\u201d, 1998. Available: http:\/\/burtleburtle.net\/bob\/rand\/isaac.html"},{"key":"67_CR17","doi-asserted-by":"crossref","unstructured":"A. Klein, \u201cAttacks on the RC4 stream cipher\u201d, Designs, Codes and Cryptography, Vol. 48, No. 3, Springer-Verlag, pp. 269\u2013286, 2008. Available: http:\/\/cage.ugent.be\/~klein\/RC4\/RC4-en.ps","DOI":"10.1007\/s10623-008-9206-6"},{"key":"67_CR18","unstructured":"KoreK, Need security pointers, 2004. Available: http:\/\/www.netstumbler.org\/showthread.php?postid=89036#post89036"},{"key":"67_CR19","unstructured":"KoreK, Next generation of WEP attacks?, 2004. Available http:\/\/www.netstumbler.org\/showpost.php?p=93942&postcount=35"},{"key":"67_CR20","unstructured":"L. R. Knudsen, W. Meier, B. Preneel, V. Rijmen, and S. Verdoolaege, \u201cAnalysis Methods for (Alleged) RC4\u201d, in Proc. International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT\u201998, Beijing, Lecture Notes in Computer Science, Springer-Verlag, Vol.1514, pp.327\u2013341, 1998."},{"key":"67_CR21","unstructured":"D. E. Knuth, \u201cThe Art of Computer Programming\u201d, Third edition, Volume 2, Addison-Wesley, 1997."},{"key":"67_CR22","unstructured":"K. Kobara and H. Imai, \u201cKey-Dependent Weak IVs and Weak Keys in WEP \u2013 How to Trace Conditions Back to Their Patterns \u2013\u201d, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E89-A, No. 8, pp. 2198\u20132206, 2006."},{"issue":"1","key":"67_CR23","first-page":"218","volume":"E91\u2013B","author":"K. Kobara","year":"2008","unstructured":"K. Kobara and H. Imai, \u201cIVs to Skip for Immunizing WEP against FMS Attack\u201d, IEICE Transactions on Communications, Vol.E91\u2013B, No.1, pp. 218\u2013227, 2008.","journal-title":"IEICE Transactions on Communications"},{"key":"67_CR24","unstructured":"I. Mantin, \u201cThe Security of the Stream Cipher RC4\u201d, Master Thesis, The Weizmann Institute of Science, 2001."},{"key":"67_CR25","unstructured":"I. Mantin and A. Shamir, \u201cA practical attack on broadcast RC4\u201d, in Proc. 8th International Workshop, FSE 2001, Yokohama, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2355, pp. 87\u2013104, 2002."},{"key":"67_CR26","unstructured":"I. Mantin, \u201cPredicting and Distinguishing Attacks on RC4 Keystream Generator\u201d, in. Proc. 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, EUROCRYPT 2005, Aarhus, Lectures Notes in Computer Science, Vol. 3494, Springer-Verlag, pp. 491\u2013506, 2005."},{"key":"67_CR27","unstructured":"I. Mantin, \u201cA Practical Attack on the Fixed RC4 in the WEP Mode\u201d, in Proc. 11th International Conference on the Theory and Application of Cryptology and Information Security, ASIACRYPT 2005, Chennai, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3788, pp. 395\u2013411, 2005."},{"key":"67_CR28","unstructured":"I. Mironov, \u201c(Not So) Random Shuffles of RC4\u201d, in Proc. 22nd Annual International Cryptology Conference, Advances in Cryptology, CRYPTO 2002, Santa Barbara, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2442, pp. 304\u2013319, 2002."},{"key":"67_CR29","unstructured":"S. Mister and S. E. Tavares, \u201cCryptanalysis of RC4-like Ciphers\u201d, in Proc. 5th Annual International Workshop, SAC 1998, Kingston, Lecture Notes in Computer Science, Springer-Verlag, Vol.1556, pp. 131\u2013143, 1999."},{"key":"67_CR30","unstructured":"T. Ohigashi, Y. Shiraishi, and M. Morii, \u201cMost IVs of FMS Attack-Resistant WEP Implementation Leak Secret Key Information\u201d, in Proc. 2005 Symposium on Cryptography and Information Security, Maiko, Vol. 4, pp. 1957\u20131962, 2005."},{"key":"67_CR31","unstructured":"T. Ohigashi, Y. Shiraishi, and M. Morii, \u201cFMS Attack-Resistant WEP Implementation Is Still Broken \u2013 Most IVs Leaks a Part of Key Information \u2013 \u201c, in Proc. International Conference, CIS 2005, Xi\u2019an, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3802, pp. 17\u201326, 2005."},{"key":"67_CR32","doi-asserted-by":"crossref","unstructured":"T. Ohigashi, Y. Shiraishi, and M. Morii, \u201cNew Weakness in the Key-Scheduling Algorithm of RC4\u201d, IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, Vol. E91-A, No. 1, pp. 3\u201311, 2008.","DOI":"10.1093\/ietfec\/e91-a.1.3"},{"key":"67_CR33","unstructured":"S. Paul and B. Preneel, \u201cAnalysis of Non-fortuitous Predictive States of the RC4 Keystream Generator\u201d, in Proc. 4th International Conference on Cryptology in India, INDOCRYPT 2003, New Delhi, Lecture Notes in Computer Science, Springer-Verlag, Vol. 2904, pp. 52\u201367, 2002."},{"key":"67_CR34","unstructured":"S. Paul and B. Preneel, \u201cA New Weakness in the RC4 Keystream Generator and an Approach to Improve the Security of the Cipher\u201d, in Proc. 11th International Workshop, FSE 2004, Delhi, Lecture Notes in Computer Science, Springer-Verlag, Vol. 3017, pp. 245\u2013259, 2004."},{"key":"67_CR35","doi-asserted-by":"crossref","unstructured":"G. Paul, S. Rathi, and S. Maitra, \u201cOn non-negligible bias of the first output bytes of RC4 towards the first three bytes of the secret key\u201d, Designs, Codes and Cryptography, Vol. 49, No. 1\u20133, Springer-Verlag, pp. 123\u2013134, 2008.","DOI":"10.1007\/s10623-008-9177-7"},{"key":"67_CR36","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1007\/BF02190184","volume":"22","author":"D. Robbins","year":"1981","unstructured":"D. Robbins and E. Bolker, \u201cThe bias of three pseudo-random shuffles\u201d, Aequationes Mathematicae, Vol. 22, pp. 268\u2013292, 1981.","journal-title":"Aequationes Mathematicae"},{"key":"67_CR37","unstructured":"A. Roos, \u201cClass of weak keys in the RC4 stream cipher\u201d, Two posts in sci.crypt, message-id 43u1eh$1j3@hermes.is.co.za and 44ebge$llf@hermes.is.co.za, 1995."},{"key":"67_CR38","unstructured":"R. Rivest, \u201cRSA security response to weaknesses in key scheduling algorithm of RC4\u201d, Tech Notes, RSA Laboratories, 2001. Available: http:\/\/www.rsasecurity.com\/rsalabs\/node.asp?id=2009"},{"key":"67_CR39","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1007\/BF01834201","volume":"44","author":"F. Schmidt","year":"1992","unstructured":"F. Schmidt and R. Simion, \u201cCard shuffling and a transformation on Sn\u201d, Aequationes Mathematicae, Vol. 44, pp. 11\u201334, 1992.","journal-title":"Aequationes Mathematicae"},{"key":"67_CR40","unstructured":"Y. Shiraishi, T. Ohigashi, and M. Morii, \u201cAn improved Internal-State Reconstruction Method of a Stream Cipher RC4\u201d, in Proc. IASTED International Conference on Communication, Network, and Information Security, CNIS 2003, New York, pp. 132\u2013135, 2003."},{"key":"67_CR41","unstructured":"A. Stubblefield, J. Ioannidis, and A. Rubin, \u201cUsing the Fluhrer, Mantin, and Shamir attack to Break WEP\u201d, Technical Report TD-4ZCPZZ, AT&T Labs, 2001."},{"issue":"2","key":"67_CR42","doi-asserted-by":"publisher","first-page":"319","DOI":"10.1145\/996943.996948","volume":"7","author":"A. Stubblefield","year":"2004","unstructured":"A. Stubblefield, J. Ioannidis, and A. Rubin, \u201cA key recovery attack on the 802.11b wired equivalent privacy protocol (WEP)\u201d, ACM Transactions on Information and System Security (TISSEC), Vol. 7, No. 2, pp. 319\u2013332, 2004.","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"key":"67_CR43","doi-asserted-by":"crossref","unstructured":"E. Tews, R. P. Weinmann, and A. Pyshkin, \u201cBreaking 104 bit WEP in less than 60 seconds\u201d, in Proc. 8th International Workshop, WISA 2007, Jeju Island, Lecture Notes in Computer Science, Vol. 4867, Springer-Verlag, pp. 188\u2013202, 2008. Available: http:\/\/eprint.iacr.org\/2007\/120.pdf","DOI":"10.1007\/978-3-540-77535-5_14"},{"key":"67_CR44","doi-asserted-by":"crossref","unstructured":"S. Vaudenay and M. Vuagnoux, \u201cPassive-only Key Recovery Attacks on RC4\u201d, in Proc. 14th International Workshop, SAC 2007, Ottawa, Lecture Notes in Computer Science, Vol. 4876, Springer-Verlag, pp. 344\u2013359, 2007. Available: http:\/\/infoscience.epfl.ch\/record\/115086\/files\/VV07.pdf","DOI":"10.1007\/978-3-540-77360-3_22"},{"key":"67_CR45","unstructured":"D. Wagner, \u201cMy RC4 weak keys\u201d, Post in sci.crypt, message-id 447o1l$cbj@cnn.princeton.edu, 1995. Available: http:\/\/www.cs.berkeley.edu\/~daw\/my-posts\/my-rc4-weak-keys"},{"key":"67_CR46","unstructured":"B. Zoltak, \u201cVMPC One-Way Function and Stream Cipher\u201d, in Proc. 11th International Workshop, FSE 2004, Delhi, Lectures Notes in Computer Science, Vol. 3017, Springer-Verlag, pp. 210\u2013225, 2004."}],"container-title":["Novel Algorithms and Techniques in Telecommunications and Networking"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-90-481-3662-9_67.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,25]],"date-time":"2020-11-25T12:04:55Z","timestamp":1606305895000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-90-481-3662-9_67"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,12,12]]},"ISBN":["9789048136612","9789048136629"],"references-count":46,"URL":"https:\/\/doi.org\/10.1007\/978-90-481-3662-9_67","relation":{},"subject":[],"published":{"date-parts":[[2009,12,12]]}}}