Copyright Statement: This is an open access article licensed under a Creative Commons Attribution 4.0 International License, which permits unrestricted use, distribution, and reproduction in any medium, even commercially as long as the original work is properly cited.
Digital Object Identifier (DOI) : 10.14569/IJACSA.2012.030319
Article Published in International Journal of Advanced Computer Science and Applications(IJACSA), Volume 3 Issue 3, 2012.
Abstract: In this paper we analyze and present some weaknesses and possible attacks on the RC4 stream cipher which were published in many journals. We review some advantages and disadvantages which come from several authors, as well as similarities and differences which can be observed in the published results. Also, we analyze the Key Scheduling Algorithm (KSA) which derives the initial state from a variable size key, and strengths and weaknesses of the RCS stream cipher. Using examples from other papers, we show that RC4 is completely insecure in a common mode of operation which is used in the widely deployed Wired Equivalent Privacy protocol (WEP, which is part of the 802.11 standard).
Lazar Stošic and Milena Bogdanovic, “ RC4 stream cipher and possible attacks on WEP” International Journal of Advanced Computer Science and Applications(IJACSA), 3(3), 2012. http://dx.doi.org/10.14569/IJACSA.2012.030319