Book description
RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4. With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4. They also explore variants of RC4 and the eSTREAM finalist HC-128.After an introduction to the vast field of
Table of contents
- Front Cover (1/2)
- Front Cover (2/2)
- Dedication
- Contents
- Foreword
- Preface
- List of Symbols
- List of Figures
- List of Tables
- List of Algorithms
- 1. Introduction to Cryptology (1/2)
- 1. Introduction to Cryptology (2/2)
- 2. Stream Ciphers and RC4 (1/2)
- 2. Stream Ciphers and RC4 (2/2)
- 3. Analysis of Key Scheduling (1/9)
- 3. Analysis of Key Scheduling (2/9)
- 3. Analysis of Key Scheduling (3/9)
- 3. Analysis of Key Scheduling (4/9)
- 3. Analysis of Key Scheduling (5/9)
- 3. Analysis of Key Scheduling (6/9)
- 3. Analysis of Key Scheduling (7/9)
- 3. Analysis of Key Scheduling (8/9)
- 3. Analysis of Key Scheduling (9/9)
- 4. Key Recovery from State Information (1/9)
- 4. Key Recovery from State Information (2/9)
- 4. Key Recovery from State Information (3/9)
- 4. Key Recovery from State Information (4/9)
- 4. Key Recovery from State Information (5/9)
- 4. Key Recovery from State Information (6/9)
- 4. Key Recovery from State Information (7/9)
- 4. Key Recovery from State Information (8/9)
- 4. Key Recovery from State Information (9/9)
- 5. Analysis of Keystream Generation (1/9)
- 5. Analysis of Keystream Generation (2/9)
- 5. Analysis of Keystream Generation (3/9)
- 5. Analysis of Keystream Generation (4/9)
- 5. Analysis of Keystream Generation (5/9)
- 5. Analysis of Keystream Generation (6/9)
- 5. Analysis of Keystream Generation (7/9)
- 5. Analysis of Keystream Generation (8/9)
- 5. Analysis of Keystream Generation (9/9)
- 6. Distinguishing Attacks (1/6)
- 6. Distinguishing Attacks (2/6)
- 6. Distinguishing Attacks (3/6)
- 6. Distinguishing Attacks (4/6)
- 6. Distinguishing Attacks (5/6)
- 6. Distinguishing Attacks (6/6)
- 7. WEP and WPA Attacks (1/2)
- 7. WEP and WPA Attacks (2/2)
- 8. Fault Attacks (1/5)
- 8. Fault Attacks (2/5)
- 8. Fault Attacks (3/5)
- 8. Fault Attacks (4/5)
- 8. Fault Attacks (5/5)
- 9. Variants of RC4 (1/5)
- 9. Variants of RC4 (2/5)
- 9. Variants of RC4 (3/5)
- 9. Variants of RC4 (4/5)
- 9. Variants of RC4 (5/5)
- 10. Stream Cipher HC-128 (1/6)
- 10. Stream Cipher HC-128 (2/6)
- 10. Stream Cipher HC-128 (3/6)
- 10. Stream Cipher HC-128 (4/6)
- 10. Stream Cipher HC-128 (5/6)
- 10. Stream Cipher HC-128 (6/6)
- 11. Conclusion
- A. A Sample C Implementation of RC4
- B. Verified Test Vectors of RC4
- Bibliography (1/4)
- Bibliography (2/4)
- Bibliography (3/4)
- Bibliography (4/4)
Product information
- Title: RC4 Stream Cipher and Its Variants
- Author(s):
- Release date: November 2011
- Publisher(s): CRC Press
- ISBN: 9781439831373
You might also like
video
Full Stack Web Development Mastery Course - Novice to Expert
Full stack development refers to the development of both frontend (client-side) and backend (server-side) portions of …
book
Computer and Information Security Handbook, 3rd Edition
Computer and Information Security Handbook, Third Edition, provides the most current and complete reference on computer …
book
Encryption for Organizations and Individuals: Basics of Contemporary and Quantum Cryptography
Cryptography and encryption aren't just for geeks and spies—they’re also part of our daily lives. This …
audiobook
How to Do Nothing
A galvanizing critique of the forces vying for our attention-and our personal information-that redefines what we …