Weak Key - List of Algorithms With Weak Keys

List of Algorithms With Weak Keys

This list is incomplete; you can help by expanding it.
  • RC4. RC4's weak initialization vectors allow an attacker to mount a known-plaintext attack and have been widely used to compromise the security of WEP.
  • IDEA. IDEA's weak keys are identifiable in a chosen-plaintext attack. They make the relationship between the XOR sum of plaintext bits and ciphertext bits predictable. There is no list of these keys, but they can be identified by their "structure".
  • Data Encryption Standard
  • Blowfish. Blowfish's weak keys produce bad S-boxes, since Blowfish's S-boxes are key-dependent. There is a chosen plaintext attack against a reduced-round variant of Blowfish that is made easier by the use of weak keys. This is not a concern for full 16-round Blowfish.

Read more about this topic:  Weak Key

Famous quotes containing the words list of, list, weak and/or keys:

    I made a list of things I have
    to remember and a list
    of things I want to forget,
    but I see they are the same list.
    Linda Pastan (b. 1932)

    All is possible,
    Who so list believe;
    Trust therefore first, and after preve,
    As men wed ladies by license and leave,
    All is possible.
    Sir Thomas Wyatt (1503?–1542)

    He serveth the servant,
    The brave he loves amain;
    He kills the cripple and the sick,
    And straight begins again.
    For gods delight in gods,
    And thrust the weak aside;
    To him who scorns their charities,
    Their arms fly open wide.
    Ralph Waldo Emerson (1803–1882)

    McCoy: That shark’s been following us ever since the surgeon died, waiting for the burial. Couldn’t I have a musket to shoot it, sir?
    Fletcher Christian: Take the deck, McCoy. I’ll get the keys to the arms chest.
    McCoy: Get two muskets, sir. I’d like to shoot that shark on board.
    Talbot Jennings (1896–1985)