1996-10-22 - RC4 analysis

Header Data

From: jcard@st6000.sct.edu (Justin Card)
To: cypherpunks@toad.com
Message Hash: c493533d0aa8dfd2ebac31133c53b8fc893db5773a167d9bf2a3ee817dff196c
Message ID: <9610221459.AA92962@st6000.sct.edu>
Reply To: N/A
UTC Datetime: 1996-10-22 15:02:15 UTC
Raw Date: Tue, 22 Oct 1996 08:02:15 -0700 (PDT)

Raw message

From: jcard@st6000.sct.edu (Justin Card)
Date: Tue, 22 Oct 1996 08:02:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RC4 analysis
Message-ID: <9610221459.AA92962@st6000.sct.edu>
MIME-Version: 1.0
Content-Type: text/plain


Has anybody out there done any significant analysis of the RC4 stream
cipher?  What I am interested in is the expected cycle length of the 
standard implementation (256 byte state table)?  Working with the reduced
sizes, the cycle length appears to grow exponentially, but I am unsure how
to verify this.  

Have there been any other results surfacing besides the reports on weak keys?

thx.
Justin





Thread