OnlineWoerterBuecher.de
Internes

Lexikon


RC4


A cipher designed by {RSA Data Security, Inc.} which can accept {keys} of arbitrary length, and is essentially a pseudo random number generator with the output of the generator being XORed with the data stream to produce the encrypted data. For this reason, it is very important that the same RC4 key never be used to encrypt two different data streams. The encryption mechanism used to be a trade secret, until someone posted source code for an algorithm onto Usenet News, claiming it to be equivalent to RC4. The algorithm is very fast, its security is unknown, but breaking it does not seem trivial either. There is very strong evidence that the posted algorithm is indeed equivalent to RC4. The United States government routinely approves RC4 with 40-bit keys for export. Keys this small can be easily broken by governments, criminals, and amateurs. The exportable version of Netscape' s Secure Socket Layer, which uses RC4-40, was broken by at least two independent groups. Breaking it took about eight days in many universities or companies the same computing power is available to any computer science student. See also {Damien Doligez' s SSL cracking page (http://pauillac.inria.fr/~doligez/ssl/)}, {RC4 Source and Information (http://www.cs.hut.fi/crypto/rc4)}, {SSLeay (http://www.cs.hut.fi/crypto/software.html#ssleay)}, {Crypto++ (http://www.cs.hut.fi/crypto/software.html#crypto++)}, {Ssh (http://www.cs.hut.fi/crypto/software.html#ssh)}, {A collection of articles (http://www.cs.hut.fi/crypto/rc4-breaking)}. (1996-10-28)

In addition suitable contents:
[ 2 ] [ = ] [ accept ] [ ad ] [ ag ] [ ai ] [ al ] [ algorithm ] [ am ] [ an ] [ app ] [ ar ] [ arc ] [ as ] [ at ] [ au ] [ av ] [ B ] [ b ] [ be ] [ bi ] [ bit ] [ bo ] [ br ] [ break ] [ broken ] [ by ] [ C ] [ ca ] [ cc ] [ ch ] [ ci ] [ ck ] [ cl ] [ co ] [ code ] [ com ] [ computer ] [ computing ] [ cr ] [ cracking ] [ crypt ] [ cryptography ] [ cu ] [ D ] [ data ] [ de ] [ design ] [ diff ] [ do ] [ du ] [ ec ] [ ed ] [ ee ] [ encryption ] [ er ] [ era ] [ es ] [ et ] [ fas ] [ fi ] [ file ] [ fo ] [ for ] [ fr ] [ ge ] [ gen ] [ gh ] [ gn ] [ gov ] [ gr ] [ graph ] [ group ] [ gt ] [ h ] [ hat ] [ hm ] [ hr ] [ ht ] [ hu ] [ id ] [ ie ] [ iff ] [ il ] [ import ] [ in ] [ io ] [ is ] [ it ] [ K ] [ ke ] [ ken ] [ key ] [ ki ] [ kn ] [ la ] [ Lex ] [ li ] [ ls ] [ ly ] [ ma ] [ mall ] [ man ] [ ml ] [ mo ] [ mod ] [ module ] [ mp ] [ ms ] [ N ] [ na ] [ nc ] [ ne ] [ net ] [ Netscape ] [ nf ] [ ng ] [ ni ] [ no ] [ nr ] [ nu ] [ O ] [ om ] [ onto ] [ OR ] [ output ] [ pa ] [ page ] [ pe ] [ ph ] [ port ] [ portable ] [ post ] [ pr ] [ pseudo ] [ pt ] [ query ] [ random ] [ rc ] [ re ] [ ro ] [ routine ] [ RS ] [ RSA ] [ RSA Data Security, Inc. ] [ S ] [ SA ] [ sa ] [ sam ] [ sc ] [ se ] [ sh ] [ si ] [ sig ] [ sit ] [ SL ] [ sl ] [ sm ] [ so ] [ software ] [ source ] [ source code ] [ ssh ] [ SSL ] [ SSLeay ] [ st ] [ stream ] [ T ] [ table ] [ th ] [ tm ] [ to ] [ tp ] [ tr ] [ tron ] [ tt ] [ tw ] [ um ] [ up ] [ us ] [ Usenet ] [ va ] [ ve ] [ version ] [ vi ] [ ws ] [ X ] [ ye ] [ ~ ]






Go Back ]

Free On-line Dictionary of Computing

Copyright © by OnlineWoerterBuecher.de - (10410 Reads)

All logos and trademarks in this site are property of their respective owner.

Page Generation in 0.1007 Seconds, with 17 Database-Queries
Zurück zur Startseite