期刊文献+

RC4密码的改进方法及其性能分析 被引量:7

Improved RC4 Cipher Method and Its Performance Analysis
下载PDF
导出
摘要 针对RC4密码技术在工程应用中存在的弱密钥和相关密钥攻击、不变性弱点、数据流偏向性弱点等安全问题,提出一种将ECC技术与RC4技术相结合的方法。对改进后的RC4的数据处理效率、密钥管理、安全性能进行研究和分析。改进后的RC4技术在保证与RC4数据处理效率相近的同时,对当前针对RC4流密码的密码分析方法具有一定的抗攻击性。该技术较好地解决了密钥的共享和更新问题,具有重要的工程应用意义。 When used in application, RC4 cipher technology has some problems, such as weak keys and related key attacks, invariance weakness,, byte bias and so on. This paper presents an improved RC4 cipher technology, which combines the ECC cipher and the RC4 stream cipher. The emphasis is analyzing the efficiency, the management of keys, and the capability of the improved RC4 cipher. The result indicates that the efficiency of the improved RC4 is just a litter lower than RC4 stream cipher while the security is much better than RC4. It has good repellency of the current attacks which aim at RC4 stream cipher. What is more, the improved RC4 cipher has a good way to solve the problems about key management and key update, which is very significant in application.
作者 李琴 曾凡平
出处 《计算机工程》 CAS CSCD 北大核心 2008年第18期181-183,共3页 Computer Engineering
关键词 RC4技术 改进的RC4 密钥协商 并行的类FPK散列算法 RC4 technology improved RC4 consultation of key parallel FPK-like Hash algorithm
  • 相关文献

参考文献4

  • 1耿嘉,曹秀英,毕光国.一种攻击RC4-WEP类密码的改进方法[J].通信学报,2004,25(1):11-21. 被引量:7
  • 2Mantin I, Shamir A. A Practical Attack on Broadcast RC4[C]//Proc. of the 8th International Workshop on Fast Software Encryption. [S. l.]: Springer-Verlag, 2002.
  • 3Mantin I. Analysis of the Stream Cipher RC4[D]. Israel: Weizmann Institute of Science, 2001-11-27.
  • 4Mousa A, Hamad A. Evaluation of the RC4 Algorithm for Data Encryption[J]. International Journal of Computer Science & Applications, 2006, 3(2): 44-56.

二级参考文献4

  • 1[4]STUBBLEFIELD A, IOANNIDIS J, RUBIN A D. Using the fiuhrer, mantin, and shamir attack to break WEP, revision 2[EB/OL].http://www.cs.rice.edu/astubble/wep/.
  • 2[1]FLUHRER S, MANTIN I, SHAMIR A. Weaknesses in the key scheduling algorithm of RC4[EB/OL]. http://www. drizzle.com/aboba/IEEE/rc4_ksaproc.pdf.
  • 3[2]IEEE Standards Board, 802 part 11:Wireless LAN Medium Access Control(MAC)and Physical Layer (PHY) Specifications[S]. IEEE Standard 802.11, 1999.
  • 4[3]HULTON D. Practical exploitation of RC4 weakness in WEP environents[EB/OL]. http://www.dachb0den.com/projects/bsd airtools Feb 22,2002.

共引文献6

同被引文献43

  • 1卓继亮,李先贤,李建欣,怀进鹏.安全协议的攻击分类及其安全性评估[J].计算机研究与发展,2005,42(7):1100-1107. 被引量:16
  • 2高晔方,卢全国,丁蕙.一次一密的多表代换密码体系的设计与实现[J].南昌工程学院学报,2005,24(3):29-32. 被引量:1
  • 3Scott R, ltsik M, Sharnir A. Weaknesses in the Key Scheduling Algorithm of RC4[C]//Proc. of the 8th Annual International Workshop on Selected Areas in Cryptography. [S. l.]: ACM Press, 2001.
  • 4Nikita B, Ian G, David W. Intercepting Mobile Communications: The Insecurity of 802.11[C]//Pro. of the 7th Annual International Conference on Mobile Computing and Networking. New York, USA: ACM Press, 2001.
  • 5Wu Hongjun. The Misuse of RC4 in Microsoft Word and Excel[Z]. (2005-01-10). http://eprint.iacr.org/2005/007.pdf.
  • 6Kwok S. Effective Uses of FPGAs for Brute-force Attack on RC4 Ciphers[J]. IEEE Transactions on Very Large Scale Integration (VLSl)Systems, 2008, 16(8): 1096-1100.
  • 7Microsoft Office Binary(doc, xls, ppt) File Formats[Z]. (2008-02-15). http://www.microsoft.com/interop/docs/OfficeBinaryFormats.mspx.
  • 8Daniel R. Open Office Documentation of the Microsoft Compound Document File Format[Z]. (2007-08-07). http://sc.openoffice.org/ compdocfileformat.pd f.
  • 9Daniel R. Open Office Documentation of the Microsoft Excel File Format[Z]. (2008-04-02). http://sc.openoffice.org/excelfileformat.pdf.
  • 10Hellman M E. A Cryptanalytic Time-memory Trade-off[J]. IEEE Transactions on Information Theory, 1980, 26(4): 401-406.

引证文献7

二级引证文献8

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部