Skip to main content

Questions tagged [rc4]

RC4 is a fast and simple stream cipher used correctly in SSL and incorrectly in WEP.

0 votes
1 answer
70 views

Here is Zipcrypto decryption algorithm: ...
terry franklin's user avatar
2 votes
1 answer
278 views

What issues do yall see with the following in terms of key recovery and related key attacks: RC4 used to "sign" a nonce: 3 byte nonce concatenated with 16 byte long term key > RC4 ...
HANGOBA's user avatar
  • 21
2 votes
0 answers
108 views

I'm trying to implement the 1st round attack on RC4 stream cipher according to Attacks on the RC4 stream cipher. For now I am interested in section 4.2 Attack on other key bytes. It works really fine ...
SarkoxedaF's user avatar
0 votes
1 answer
161 views

I am looking for symmetric cryptography algorithms that can be implemented on chips with very few resources (about 256K RAM and 16MHz CPU). An algorithm that works perfectly in this environment is RC4,...
Begoña Garcia's user avatar
0 votes
1 answer
293 views

I have taken this implementation of RC4 written in C. I have 40-bit key and 32-bit IV (both in hex). So, questions is about KSA step: How should I transform hex key value into the char array? Just ...
ALEX's user avatar
  • 1
0 votes
2 answers
1k views

I'm having difficulty decrypting a secret message as a part of a CTF and I was wondering how could I decrypt an encrypted text that has been encrypted with pycrypto RC4 and when the first 8 characters ...
DireHacker's user avatar
0 votes
1 answer
245 views

I am working with an older piece of software that generates encrypted backups that I'd like to decrypt. I have a plaintext key, a few examples of encrypted data and I'm pretty sure the data is ASCII, ...
slipheed's user avatar
  • 437
0 votes
1 answer
546 views

Kerberos uses des-cbc-hmac (mac and encrypt) and rc4-hmac-exp based on md5 (mac and encrypt I think) in their encryptions. Those encryptions are considered as weak and should not be used. Why are they ...
adi's user avatar
  • 175
0 votes
1 answer
1k views

I have learned about the kerberos protocol and seen that the windows version uses a couple of authenticated encryption schemas (like rc4-hmac-md5). What type of authenticated encryption is it? Is it a:...
adi's user avatar
  • 175
1 vote
1 answer
125 views

I never worked with cryptography but I wanted to add an easter egg on the design I'm making for a t-shirt. I need it to have a key that will be embroided on the front design wich is: 15122017 that ...
artemocdr's user avatar
2 votes
1 answer
291 views

I'm trying to figure out MS CryptoAPI to generate a symmetric key on one computer then an RSA key on another, send over that public key to use to export the symmetric key to that other computer. I'm ...
user3161924's user avatar
0 votes
0 answers
205 views

I'm trying to learn how to go about cracking RC4 ciphers (nothing illegal, its an old, i.e., not active challenge for a job application, so no cheating). I have nine md5 hashes with their own ciphers. ...
Richard's user avatar
0 votes
2 answers
3k views

So I understand that a keystream is generating from a key and is the length of the message you want to send, so that you can properly XOR every bit. But I'm having trouble finding and understanding ...
Joshua Segal's user avatar
1 vote
1 answer
98 views

Encryption process for any outgoing packet to the specified "remote IP": -original payload P is encrypted (the bytes after the IP header) using RC4 with the preestablished key ...
Koolz's user avatar
  • 13
6 votes
1 answer
305 views

I saw a question on StackOverflow where RC4 was initialized by a 1024 bit key (with 2048 the maximum key size, if I'm not mistaken). Will such a large key size possibly solve any of the bias of the ...
Maarten Bodewes's user avatar
  • 97.1k

15 30 50 per page
1
2 3 4 5
8