{"id":"https://openalex.org/W2599300409","doi":"https://doi.org/10.1007/s10623-017-0355-3","title":"Analysing and exploiting the Mantin biases in RC4","display_name":"Analysing and exploiting the Mantin biases in RC4","publication_year":2017,"publication_date":"2017-03-28","ids":{"openalex":"https://openalex.org/W2599300409","doi":"https://doi.org/10.1007/s10623-017-0355-3","mag":"2599300409","pmid":"https://pubmed.ncbi.nlm.nih.gov/31929683"},"language":"en","primary_location":{"id":"doi:10.1007/s10623-017-0355-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-017-0355-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-017-0355-3.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"type":"article","indexed_in":["crossref","pubmed"],"open_access":{"is_oa":true,"oa_status":"hybrid","oa_url":"https://link.springer.com/content/pdf/10.1007/s10623-017-0355-3.pdf","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5001827669","display_name":"R\u00e9mi Bricout","orcid":null},"institutions":[{"id":"https://openalex.org/I29607241","display_name":"\u00c9cole Normale Sup\u00e9rieure - PSL","ror":"https://ror.org/05a0dhs15","country_code":"FR","type":"funder","lineage":["https://openalex.org/I2746051580","https://openalex.org/I29607241"]},{"id":"https://openalex.org/I4210149507","display_name":"\u00c9cole des Neurosciences de Paris","ror":"https://ror.org/05re0sm29","country_code":"FR","type":"other","lineage":["https://openalex.org/I39804081","https://openalex.org/I4210149507"]}],"countries":["FR"],"is_corresponding":true,"raw_author_name":"Remi Bricout","raw_affiliation_strings":["1ENS, Paris, France","ENS, Paris, France"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"1ENS, Paris, France","institution_ids":[]},{"raw_affiliation_string":"ENS, Paris, France","institution_ids":["https://openalex.org/I4210149507","https://openalex.org/I29607241"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5061053285","display_name":"Se\u00e1n Murphy","orcid":"https://orcid.org/0000-0002-6582-4065"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Sean Murphy","raw_affiliation_strings":["2Royal Holloway, University of London, Egham, UK","Royal Holloway, University of London,  Egham, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"2Royal Holloway, University of London, Egham, UK","institution_ids":[]},{"raw_affiliation_string":"Royal Holloway, University of London,  Egham, UK","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072987600","display_name":"Kenneth G. Paterson","orcid":"https://orcid.org/0000-0002-5145-4489"},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Kenneth G. Paterson","raw_affiliation_strings":["2Royal Holloway, University of London, Egham, UK","Royal Holloway, University of London,  Egham, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"2Royal Holloway, University of London, Egham, UK","institution_ids":[]},{"raw_affiliation_string":"Royal Holloway, University of London,  Egham, UK","institution_ids":["https://openalex.org/I184558857"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5081640096","display_name":"Thyla van der Merwe","orcid":null},"institutions":[{"id":"https://openalex.org/I184558857","display_name":"Royal Holloway University of London","ror":"https://ror.org/04g2vpn86","country_code":"GB","type":"education","lineage":["https://openalex.org/I124357947","https://openalex.org/I184558857"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Thyla van der Merwe","raw_affiliation_strings":["2Royal Holloway, University of London, Egham, UK","Royal Holloway, University of London,  Egham, UK"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"2Royal Holloway, University of London, Egham, UK","institution_ids":[]},{"raw_affiliation_string":"Royal Holloway, University of London,  Egham, UK","institution_ids":["https://openalex.org/I184558857"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5001827669"],"corresponding_institution_ids":["https://openalex.org/I29607241","https://openalex.org/I4210149507"],"apc_list":{"value":2290,"currency":"EUR","value_usd":2890},"apc_paid":{"value":2290,"currency":"EUR","value_usd":2890},"fwci":1.4573,"has_fulltext":true,"cited_by_count":12,"citation_normalized_percentile":{"value":0.86365196,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":"86","issue":"4","first_page":"743","last_page":"770"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10951","display_name":"Cryptographic Implementations and Security","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11130","display_name":"Coding theory and cryptography","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9932000041007996,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8291022777557373},{"id":"https://openalex.org/keywords/byte","display_name":"Byte","score":0.8020439743995667},{"id":"https://openalex.org/keywords/plaintext","display_name":"Plaintext","score":0.7932168245315552},{"id":"https://openalex.org/keywords/rc4","display_name":"RC4","score":0.7602952122688293},{"id":"https://openalex.org/keywords/session","display_name":"Session (web analytics)","score":0.49030783772468567},{"id":"https://openalex.org/keywords/cryptanalysis","display_name":"Cryptanalysis","score":0.42123791575431824},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4109760522842407},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.38551586866378784},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.3768972158432007},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.3454928994178772},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.32040542364120483},{"id":"https://openalex.org/keywords/stream-cipher","display_name":"Stream cipher","score":0.2734961211681366},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.16542625427246094},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.07417252659797668}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8291022777557373},{"id":"https://openalex.org/C43364308","wikidata":"https://www.wikidata.org/wiki/Q8799","display_name":"Byte","level":2,"score":0.8020439743995667},{"id":"https://openalex.org/C92717368","wikidata":"https://www.wikidata.org/wiki/Q1162538","display_name":"Plaintext","level":3,"score":0.7932168245315552},{"id":"https://openalex.org/C109154458","wikidata":"https://www.wikidata.org/wiki/Q846955","display_name":"RC4","level":4,"score":0.7602952122688293},{"id":"https://openalex.org/C2779182362","wikidata":"https://www.wikidata.org/wiki/Q17126187","display_name":"Session (web analytics)","level":2,"score":0.49030783772468567},{"id":"https://openalex.org/C181149355","wikidata":"https://www.wikidata.org/wiki/Q897511","display_name":"Cryptanalysis","level":3,"score":0.42123791575431824},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4109760522842407},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.38551586866378784},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3768972158432007},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.3454928994178772},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.32040542364120483},{"id":"https://openalex.org/C92950451","wikidata":"https://www.wikidata.org/wiki/Q864718","display_name":"Stream cipher","level":3,"score":0.2734961211681366},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.16542625427246094},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.07417252659797668}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1007/s10623-017-0355-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-017-0355-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-017-0355-3.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},{"id":"pmid:31929683","is_oa":false,"landing_page_url":"https://pubmed.ncbi.nlm.nih.gov/31929683","pdf_url":null,"source":{"id":"https://openalex.org/S4306525036","display_name":"PubMed","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, codes, and cryptography","raw_type":null},{"id":"pmh:oai:pubmedcentral.nih.gov:6936655","is_oa":true,"landing_page_url":"https://www.ncbi.nlm.nih.gov/pmc/articles/6936655","pdf_url":null,"source":{"id":"https://openalex.org/S2764455111","display_name":"PubMed Central","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I1299303238","host_organization_name":"National Institutes of Health","host_organization_lineage":["https://openalex.org/I1299303238"],"host_organization_lineage_names":[],"type":"repository"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Des Codes Cryptogr","raw_type":"Text"}],"best_oa_location":{"id":"doi:10.1007/s10623-017-0355-3","is_oa":true,"landing_page_url":"https://doi.org/10.1007/s10623-017-0355-3","pdf_url":"https://link.springer.com/content/pdf/10.1007/s10623-017-0355-3.pdf","source":{"id":"https://openalex.org/S81616010","display_name":"Designs Codes and Cryptography","issn_l":"0925-1022","issn":["0925-1022","1573-7586"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"journal"},"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Designs, Codes and Cryptography","raw_type":"journal-article"},"sustainable_development_goals":[{"score":0.4399999976158142,"id":"https://metadata.un.org/sdg/16","display_name":"Peace, Justice and strong institutions"}],"awards":[{"id":"https://openalex.org/G1720581138","display_name":null,"funder_award_id":"EP/H005455/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G2699641540","display_name":"Centre for Doctoral Training in Cyber Security at Royal Holloway","funder_award_id":"EP/K035584/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5126361470","display_name":null,"funder_award_id":"K035584/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G5181622720","display_name":null,"funder_award_id":"EP/H005455/1;","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"},{"id":"https://openalex.org/G6072676146","display_name":"Cryptography: Bridging Theory and Practice","funder_award_id":"EP/H005455/1","funder_id":"https://openalex.org/F4320334627","funder_display_name":"Engineering and Physical Sciences Research Council"}],"funders":[{"id":"https://openalex.org/F4320314707","display_name":"Government of the United Kingdom","ror":"https://ror.org/05wnh3t63"},{"id":"https://openalex.org/F4320322183","display_name":"Huawei Technologies","ror":"https://ror.org/00cmhce21"},{"id":"https://openalex.org/F4320334627","display_name":"Engineering and Physical Sciences Research Council","ror":"https://ror.org/0439y7842"},{"id":"https://openalex.org/F4320335935","display_name":"Royal Holloway, University of London","ror":"https://ror.org/04g2vpn86"}],"has_content":{"pdf":true,"grobid_xml":true},"content_urls":{"pdf":"https://content.openalex.org/works/W2599300409.pdf","grobid_xml":"https://content.openalex.org/works/W2599300409.grobid-xml"},"referenced_works_count":12,"referenced_works":["https://openalex.org/W275522414","https://openalex.org/W1427983509","https://openalex.org/W1428080140","https://openalex.org/W1439967542","https://openalex.org/W1500414598","https://openalex.org/W1566979565","https://openalex.org/W1584768110","https://openalex.org/W2119294557","https://openalex.org/W2142081526","https://openalex.org/W2149072083","https://openalex.org/W2318245334","https://openalex.org/W4301028492"],"related_works":["https://openalex.org/W1427983509","https://openalex.org/W1970001951","https://openalex.org/W39401898","https://openalex.org/W2952272254","https://openalex.org/W3030636251","https://openalex.org/W2599300409","https://openalex.org/W2142081526","https://openalex.org/W1516219571","https://openalex.org/W2808458864","https://openalex.org/W2614775582"],"abstract_inverted_index":{"We":[0,17,31,56,101,121,159],"explore":[1],"the":[2,5,36,44,113,124,133],"use":[3,61],"of":[4,23,75,83,115,135,141],"Mantin":[6,45],"biases":[7,25,46,63],"(Mantin,":[8],"Eurocrypt":[9],"2005)":[10],"to":[11,60,81,109,131],"recover":[12,167],"plaintexts":[13,169],"from":[14],"RC4-encrypted":[15],"traffic.":[16],"provide":[18,102],"a":[19,65,87,103,139],"more":[20],"fine-grained":[21],"analysis":[22,38],"these":[24,62],"than":[26,53],"in":[27,34,41,64,91,144,157],"Mantin\u2019s":[28],"original":[29,37],"work.":[30],"show":[32,58],"that,":[33],"fact,":[35],"was":[39],"incorrect":[40],"certain":[42],"cases:":[43],"are":[47,78,153],"sometimes":[48,51],"non-existent,":[49],"and":[50,118,149],"stronger":[52],"originally":[54],"predicted.":[55],"then":[57,122],"how":[59],"plaintext":[66,76,85],"recovery":[67],"attack.":[68],"Our":[69],"attack":[70,117,125],"targets":[71],"two":[72],"unknown":[73],"bytes":[74],"that":[77,89,106,152,163],"located":[79],"close":[80],"sequences":[82],"known":[84],"bytes,":[86],"situation":[88],"arises":[90],"practice":[92],"when":[93],"RC4":[94,156],"is":[95],"used":[96],"in,":[97],"for":[98],"example,":[99],"TLS.":[100,158],"statistical":[104],"framework":[105],"enables":[107],"us":[108],"make":[110],"predictions":[111],"about":[112],"performance":[114],"this":[116],"its":[119],"variants.":[120],"extend":[123],"using":[126,174],"standard":[127],"dynamic":[128],"programming":[129],"techniques":[130],"tackle":[132],"problem":[134],"recovering":[136,145],"longer":[137],"plaintexts,":[138],"setting":[140],"practical":[142],"interest":[143],"HTTP":[146],"session":[147],"cookies":[148],"user":[150],"passwords":[151],"protected":[154],"by":[155],"perform":[160],"experiments":[161],"showing":[162],"we":[164],"can":[165],"successfully":[166],"16-byte":[168],"with":[170],"80%":[171],"success":[172],"rate":[173],"$$2^{31}$$":[175],"ciphertexts,":[176],"an":[177],"improvement":[178],"over":[179],"previous":[180],"attacks.":[181]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":1},{"year":2019,"cited_by_count":2},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":1},{"year":2016,"cited_by_count":2}],"updated_date":"2026-05-16T08:24:45.110214","created_date":"2025-10-10T00:00:00"}
