Weak Key - List of Algorithms With Weak Keys

List of Algorithms With Weak Keys

This list is incomplete; you can help by expanding it.
  • RC4. RC4's weak initialization vectors allow an attacker to mount a known-plaintext attack and have been widely used to compromise the security of WEP.
  • IDEA. IDEA's weak keys are identifiable in a chosen-plaintext attack. They make the relationship between the XOR sum of plaintext bits and ciphertext bits predictable. There is no list of these keys, but they can be identified by their "structure".
  • Data Encryption Standard
  • Blowfish. Blowfish's weak keys produce bad S-boxes, since Blowfish's S-boxes are key-dependent. There is a chosen plaintext attack against a reduced-round variant of Blowfish that is made easier by the use of weak keys. This is not a concern for full 16-round Blowfish.

Read more about this topic:  Weak Key

Famous quotes containing the words list of, list, weak and/or keys:

    The advice of their elders to young men is very apt to be as unreal as a list of the hundred best books.
    Oliver Wendell Holmes, Jr. (1841–1935)

    Feminism is an entire world view or gestalt, not just a laundry list of women’s issues.
    Charlotte Bunch (b. 1944)

    What the unpenetrating world call Humanity, is often no more than a weak mind pitying itself.
    Samuel Richardson (1689–1761)

    Thou hast the keys of Paradise, oh just, subtle, and mighty opium!
    Thomas De Quincey (1785–1859)