Weak Key - List of Algorithms With Weak Keys

List of Algorithms With Weak Keys

This list is incomplete; you can help by expanding it.
  • RC4. RC4's weak initialization vectors allow an attacker to mount a known-plaintext attack and have been widely used to compromise the security of WEP.
  • IDEA. IDEA's weak keys are identifiable in a chosen-plaintext attack. They make the relationship between the XOR sum of plaintext bits and ciphertext bits predictable. There is no list of these keys, but they can be identified by their "structure".
  • Data Encryption Standard
  • Blowfish. Blowfish's weak keys produce bad S-boxes, since Blowfish's S-boxes are key-dependent. There is a chosen plaintext attack against a reduced-round variant of Blowfish that is made easier by the use of weak keys. This is not a concern for full 16-round Blowfish.

Read more about this topic:  Weak Key

Famous quotes containing the words list of, list, weak and/or keys:

    My list of things I never pictured myself saying when I pictured myself as a parent has grown over the years.
    Polly Berrien Berends (20th century)

    Lovers, forget your love,
    And list to the love of these,
    She a window flower,
    And he a winter breeze.
    Robert Frost (1874–1963)

    O Kate, nice customs curtsy to great kings. Dear Kate, you
    and I cannot be confined within the weak list of a country’s
    fashion. We are the makers of manners, Kate.
    William Shakespeare (1564–1616)

    McCoy: That shark’s been following us ever since the surgeon died, waiting for the burial. Couldn’t I have a musket to shoot it, sir?
    Fletcher Christian: Take the deck, McCoy. I’ll get the keys to the arms chest.
    McCoy: Get two muskets, sir. I’d like to shoot that shark on board.
    Talbot Jennings (1896–1985)