Access the full text.
Sign up today, get DeepDyve free for 14 days.
Xiaoyun Wang, D. Feng, Xuejia Lai, Hongbo Yu (2004)
Collisions for Hash Functions MD4, MD5, HAVAL-128 and RIPEMDIACR Cryptol. ePrint Arch., 2004
S. Fluhrer, I. Mantin, A. Shamir (2001)
Weaknesses in the Key Scheduling Algorithm of RC4
Jonathan Hoch, A. Shamir (2004)
Fault Analysis of Stream Ciphers
Xiaoyun Wang, Y. Yin, Hongbo Yu (2005)
Finding Collisions in the Full SHA-1
E. Biham, L. Granboulan, Phong Nguyen (2005)
Impossible Fault Analysis of RC4 and Differential Fault Analysis of RC4
I. Mantin, A. Shamir (2001)
A Practical Attack on Broadcast RC4
S. Fluhrer (2002)
Attacks on RC4 and WEP, 5
(2002)
Attacks on RC 4 and WEP [ J ]
Paul Midian (2002)
Perspectives on Penetration TestingComputer Fraud & Security, 2002
L. Knudsen, W. Meier, B. Preneel, V. Rijmen, Sven Verdoolaege (1998)
Analysis Methods for (Alleged) RC4
The characteristics of the wireless network determine the requirement of lightweight cryptography. Towards the huge cost of an existing algorithm such as MD5, this paper proposes a message digest scheme based on the RC4 algorithm which broadens the application area of the RC4 and decreases the requirement of resource or cost. To test the randomicity of the algorithm’s digest, fifteen kinds of randomicity test to NIST randomicity test standard had been done, and the comparative analysis which compares the digest’s randomicity of the algorithm with MD5 had been performed as well. The performance of the algorithm had been analyzed in aspects of mono-directivity, randomicity, practicality and complexness. Statistic tests and analysis results illustrated that our scheme was of low cost of computing, good statistic performance, high running speed and lightweight.
Wuhan University Journal of Natural Sciences – Springer Journals
Published: Jun 1, 2010
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.