RC4 Stream Cipher and Its Variants

Book description

RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128.After an introduction to the vast field of

Table of contents

  1. Front Cover (1/2)
  2. Front Cover (2/2)
  3. Dedication
  4. Contents
  5. Foreword
  6. Preface
  7. List of Symbols
  8. List of Figures
  9. List of Tables
  10. List of Algorithms
  11. 1. Introduction to Cryptology (1/2)
  12. 1. Introduction to Cryptology (2/2)
  13. 2. Stream Ciphers and RC4 (1/2)
  14. 2. Stream Ciphers and RC4 (2/2)
  15. 3. Analysis of Key Scheduling (1/9)
  16. 3. Analysis of Key Scheduling (2/9)
  17. 3. Analysis of Key Scheduling (3/9)
  18. 3. Analysis of Key Scheduling (4/9)
  19. 3. Analysis of Key Scheduling (5/9)
  20. 3. Analysis of Key Scheduling (6/9)
  21. 3. Analysis of Key Scheduling (7/9)
  22. 3. Analysis of Key Scheduling (8/9)
  23. 3. Analysis of Key Scheduling (9/9)
  24. 4. Key Recovery from State Information (1/9)
  25. 4. Key Recovery from State Information (2/9)
  26. 4. Key Recovery from State Information (3/9)
  27. 4. Key Recovery from State Information (4/9)
  28. 4. Key Recovery from State Information (5/9)
  29. 4. Key Recovery from State Information (6/9)
  30. 4. Key Recovery from State Information (7/9)
  31. 4. Key Recovery from State Information (8/9)
  32. 4. Key Recovery from State Information (9/9)
  33. 5. Analysis of Keystream Generation (1/9)
  34. 5. Analysis of Keystream Generation (2/9)
  35. 5. Analysis of Keystream Generation (3/9)
  36. 5. Analysis of Keystream Generation (4/9)
  37. 5. Analysis of Keystream Generation (5/9)
  38. 5. Analysis of Keystream Generation (6/9)
  39. 5. Analysis of Keystream Generation (7/9)
  40. 5. Analysis of Keystream Generation (8/9)
  41. 5. Analysis of Keystream Generation (9/9)
  42. 6. Distinguishing Attacks (1/6)
  43. 6. Distinguishing Attacks (2/6)
  44. 6. Distinguishing Attacks (3/6)
  45. 6. Distinguishing Attacks (4/6)
  46. 6. Distinguishing Attacks (5/6)
  47. 6. Distinguishing Attacks (6/6)
  48. 7. WEP and WPA Attacks (1/2)
  49. 7. WEP and WPA Attacks (2/2)
  50. 8. Fault Attacks (1/5)
  51. 8. Fault Attacks (2/5)
  52. 8. Fault Attacks (3/5)
  53. 8. Fault Attacks (4/5)
  54. 8. Fault Attacks (5/5)
  55. 9. Variants of RC4 (1/5)
  56. 9. Variants of RC4 (2/5)
  57. 9. Variants of RC4 (3/5)
  58. 9. Variants of RC4 (4/5)
  59. 9. Variants of RC4 (5/5)
  60. 10. Stream Cipher HC-128 (1/6)
  61. 10. Stream Cipher HC-128 (2/6)
  62. 10. Stream Cipher HC-128 (3/6)
  63. 10. Stream Cipher HC-128 (4/6)
  64. 10. Stream Cipher HC-128 (5/6)
  65. 10. Stream Cipher HC-128 (6/6)
  66. 11. Conclusion
  67. A. A Sample C Implementation of RC4
  68. B. Verified Test Vectors of RC4
  69. Bibliography (1/4)
  70. Bibliography (2/4)
  71. Bibliography (3/4)
  72. Bibliography (4/4)

Product information

  • Title: RC4 Stream Cipher and Its Variants
  • Author(s): Goutam Paul, Subhamoy Maitra
  • Release date: November 2011
  • Publisher(s): CRC Press
  • ISBN: 9781439831373