Questions tagged [rc4]
RC4 is a fast and simple stream cipher used correctly in SSL and incorrectly in WEP.
110 questions
0 votes
1 answer
70 views
Is it possible to calculate key(0) and key(1) of ZipCrypto using key(2)?
Here is Zipcrypto decryption algorithm: ...
2 votes
1 answer
278 views
RC4 Klein (or other) attack susceptibility question
What issues do yall see with the following in terms of key recovery and related key attacks: RC4 used to "sign" a nonce: 3 byte nonce concatenated with 16 byte long term key > RC4 ...
2 votes
0 answers
108 views
1st round attack on rc4
I'm trying to implement the 1st round attack on RC4 stream cipher according to Attacks on the RC4 stream cipher. For now I am interested in section 4.2 Attack on other key bytes. It works really fine ...
0 votes
1 answer
161 views
Secure symmetric cryptography for low memory/CPU systems
I am looking for symmetric cryptography algorithms that can be implemented on chips with very few resources (about 256K RAM and 16MHz CPU). An algorithm that works perfectly in this environment is RC4,...
0 votes
1 answer
293 views
RC4-40 with IV (32-bit) setup
I have taken this implementation of RC4 written in C. I have 40-bit key and 32-bit IV (both in hex). So, questions is about KSA step: How should I transform hex key value into the char array? Just ...
0 votes
2 answers
1k views
How can I decrypt an RC4 encrypted text when knowing the first 8 characters of the plain text secret?
I'm having difficulty decrypting a secret message as a part of a CTF and I was wondering how could I decrypt an encrypted text that has been encrypted with pycrypto RC4 and when the first 8 characters ...
0 votes
1 answer
245 views
RC4: Known plaintext key, unknown key derivation
I am working with an older piece of software that generates encrypted backups that I'd like to decrypt. I have a plaintext key, a few examples of encrypted data and I'm pretty sure the data is ASCII, ...
0 votes
1 answer
546 views
Why are des-cbc-hmac and rc4-hmac-exp considered weak in kerberos?
Kerberos uses des-cbc-hmac (mac and encrypt) and rc4-hmac-exp based on md5 (mac and encrypt I think) in their encryptions. Those encryptions are considered as weak and should not be used. Why are they ...
0 votes
1 answer
1k views
What authenticated encryption do kerberos use in windows?
I have learned about the kerberos protocol and seen that the windows version uses a couple of authenticated encryption schemas (like rc4-hmac-md5). What type of authenticated encryption is it? Is it a:...
1 vote
1 answer
125 views
I need a simple cryptographic code to put on a t-shirt
I never worked with cryptography but I wanted to add an easter egg on the design I'm making for a t-shirt. I need it to have a key that will be embroided on the front design wich is: 15122017 that ...
2 votes
1 answer
291 views
MS CryptoAPI RC4-1024 vs AES-128?
I'm trying to figure out MS CryptoAPI to generate a symmetric key on one computer then an RSA key on another, send over that public key to use to export the symmetric key to that other computer. I'm ...
0 votes
0 answers
205 views
Recreate RC4 Stream cipher
I'm trying to learn how to go about cracking RC4 ciphers (nothing illegal, its an old, i.e., not active challenge for a job application, so no cheating). I have nine md5 hashes with their own ciphers. ...
0 votes
2 answers
3k views
How to generate the Keystream from IV+Key in RC4
So I understand that a keystream is generating from a key and is the length of the message you want to send, so that you can properly XOR every bit. But I'm having trouble finding and understanding ...
1 vote
1 answer
98 views
If two hosts are using a transparent IP level authentication and encryption, is their communication subject to both MITM or replay attacks?
Encryption process for any outgoing packet to the specified "remote IP": -original payload P is encrypted (the bytes after the IP header) using RC4 with the preestablished key ...
6 votes
1 answer
305 views
Use large key size for RC4 to avoid RC4 bias
I saw a question on StackOverflow where RC4 was initialized by a 1024 bit key (with 2048 the maximum key size, if I'm not mistaken). Will such a large key size possibly solve any of the bias of the ...