• Publications
  • Influence
Full Plaintext Recovery Attack on Broadcast RC4
TLDR
Several new biases in the initial (1st to 257th) bytes of the RC4 keystream, which are substantially stronger than known biases are introduced, which enable a plaintext recovery attack using a strong bias set of initial bytes.
Falsification Attacks against WPA-TKIP in a Realistic Environment
TLDR
Two new falsification attacks against Wi-Fi Protected Access Temporal Key Integrity Protocol (WPATKIP) are proposed, one of which reduces the execution time for recovering a MIC key and the other expands its targets that can be attacked.
A Performance Improvement Method for the Global Live Migration of Virtual Machine with IP Mobility
TLDR
The proposed method, the source host executes the network configuration before migrating, which sets destination network information previously to the secondary interface of a VM, can reduce the number of steps for IP mobility process after migrating.
A Practical Message Falsification Attack on WPA
TLDR
This paper applies the Beck-Tews attack to the man-in-the-middle attack, and gives methods for reducing the execution time of the attack.
How to Break Py and Pypy by a Chosen-IV Attack
TLDR
A key recovery attack that has two new effective processes as compared to those of Wu and Preneel is proposed that can recover the 128-bit key with a time complexity of 2.
How to Recover Any Byte of Plaintext on RC4
TLDR
Two advanced plaintext recovery attacks that can recover any byte of a plaintext without relying on initial biases are proposed, i.e., the authors' attacks are feasible even if initial bytes of the keystream are disregarded.
Fast WEP-Key Recovery Attack Using Only Encrypted IP Packets
TLDR
This paper proposes an algorithm for recovering a 104-bit WEP key from any IP packets in a realistic environment and its complexity is equivalent to about 220 computations of the RC4 key setups.
Slide Cryptanalysis of Lightweight Stream Cipher RAKAPOSHI
TLDR
A slide property of RAKAPOSHI stream cipher is analyzed and a variant of the slide property is considered, called partial slide property, which enables a method for speeding up the brute force attack by a factor of 2 in the single key setting.
...
...