From: jcard@st6000.sct.edu (Justin Card)
To: cypherpunks@toad.com
Message Hash: c493533d0aa8dfd2ebac31133c53b8fc893db5773a167d9bf2a3ee817dff196c
Message ID: <9610221459.AA92962@st6000.sct.edu>
Reply To: N/A
UTC Datetime: 1996-10-22 15:02:15 UTC
Raw Date: Tue, 22 Oct 1996 08:02:15 -0700 (PDT)
From: jcard@st6000.sct.edu (Justin Card)
Date: Tue, 22 Oct 1996 08:02:15 -0700 (PDT)
To: cypherpunks@toad.com
Subject: RC4 analysis
Message-ID: <9610221459.AA92962@st6000.sct.edu>
MIME-Version: 1.0
Content-Type: text/plain
Has anybody out there done any significant analysis of the RC4 stream
cipher? What I am interested in is the expected cycle length of the
standard implementation (256 byte state table)? Working with the reduced
sizes, the cycle length appears to grow exponentially, but I am unsure how
to verify this.
Have there been any other results surfacing besides the reports on weak keys?
thx.
Justin
Return to October 1996
Return to “jcard@st6000.sct.edu (Justin Card)”
1996-10-22 (Tue, 22 Oct 1996 08:02:15 -0700 (PDT)) - RC4 analysis - jcard@st6000.sct.edu (Justin Card)