List of Algorithms With Weak Keys
- This list is incomplete; you can help by expanding it.
- RC4. RC4's weak initialization vectors allow an attacker to mount a known-plaintext attack and have been widely used to compromise the security of WEP.
- IDEA. IDEA's weak keys are identifiable in a chosen-plaintext attack. They make the relationship between the XOR sum of plaintext bits and ciphertext bits predictable. There is no list of these keys, but they can be identified by their "structure".
- Data Encryption Standard
- Blowfish. Blowfish's weak keys produce bad S-boxes, since Blowfish's S-boxes are key-dependent. There is a chosen plaintext attack against a reduced-round variant of Blowfish that is made easier by the use of weak keys. This is not a concern for full 16-round Blowfish.
Read more about this topic: Weak Key
Famous quotes containing the words list of, list, weak and/or keys:
“Religious literature has eminent examples, and if we run over our private list of poets, critics, philanthropists and philosophers, we shall find them infected with this dropsy and elephantiasis, which we ought to have tapped.”
—Ralph Waldo Emerson (18031882)
“Religious literature has eminent examples, and if we run over our private list of poets, critics, philanthropists and philosophers, we shall find them infected with this dropsy and elephantiasis, which we ought to have tapped.”
—Ralph Waldo Emerson (18031882)
“A strong nation, like a strong person, can afford to be gentle, firm, thoughtful, and restrained. It can afford to extend a helping hand to others. Its a weak nation, like a weak person, that must behave with bluster and boasting and rashness and other signs of insecurity.”
—Jimmy Carter (James Earl Carter, Jr.)
“Thou hast the keys of Paradise, O just, subtle, and mighty opium!”
—Thomas De Quincey (17851859)