Please use this identifier to cite or link to this item: http://dspace.dtu.ac.in:8080/jspui/handle/repository/13529
Full metadata record
DC FieldValueLanguage
dc.contributor.authorMISHRA, S P-
dc.date.accessioned2011-03-26T21:11:28Z-
dc.date.available2011-03-26T21:11:28Z-
dc.date.issued2008-05-15-
dc.identifier.urihttp://dspace.dtu.ac.in:8080/jspui/handle/repository/13530-
dc.descriptionME THESISen_US
dc.description.abstractCryptography is an important building block used i n communication systems to provide confidentiality and authenticity. Stream ciphers, which encrypt data one bit or byte at a time have been used in applications sherec low delay and hiogh speed are essential requirements.RC4, a stream cipher designed by Rivest for Data Security Inc. has been used in several commercial applications. In this thesis RC4 is described and its various weaknesses have been exploited. It is shown that second binary derivative of the least significant bit of sequence is correlated to 1 with correlation coefficient close to 152 -3n. The result can be used to distinguish RC4 from other key-stream generators. Digraph probabilities gives another method of distinguishing RC4 from random sequence requiring lesser amount of output key-stream bits. 40-bit RC4 was recommended for WEP, the link-layer security protocol for 802.11 networks. An attack was proposed by Fluhrer, Shamir and Mantin based upon non-random be...en_US
dc.language.isoenen_US
dc.relation.ispartofseriesTD-419;74-
dc.subjectCryptographyen_US
dc.subjectRC4en_US
dc.titleEXPLORING WEAKNESSES OF RC4 IN DIFFERENT USAGE MODESen_US
Appears in Collections:Faculty Publications Computer Technology & Applications

Files in This Item:
File Description SizeFormat 
spmthesis.rtf599.61 kBRTFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.