Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,322 papers from all fields of science
Search
Sign In
Create Free Account
Fluhrer, Mantin and Shamir attack
Known as:
FMS
, FMS attack
, Fluhrer, Mantin, and Shamir attack
In cryptography, the Fluhrer, Mantin and Shamir attack is a stream cipher attack on the widely used RC4 stream cipher. The attack allows an attacker…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
18 relations
AirSnort
Alice and Bob
Bar mitzvah attack
BitTorrent protocol encryption
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Tornado Attack on RC4 with Applications to WEP & WPA
Pouyan Sepehrdad
,
Petr Susil
,
S. Vaudenay
,
Martin Vuagnoux
IACR Cryptology ePrint Archive
2015
Corpus ID: 33339796
In this paper, we construct several tools for building and manipulating pools of biases in the analysis of RC4. We report…
Expand
2015
2015
A novel and efficient approach to encrypt images using chaotic logistic map and stream cipher
Manju Rani
,
Sudesh Kumar
International Conference on Green Computing and…
2015
Corpus ID: 18243363
This research gives a novel approach for fast encryption of images using chaotic maps and pixel shuffling using modified RC4…
Expand
Review
2008
Review
2008
IVs to Skip for Immunizing WEP against FMS Attack
K. Kobara
,
H. Imai
IEICE transactions on communications
2008
Corpus ID: 14472245
The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over-the-air communication. While…
Expand
2008
2008
Cryptanalysis of KSAm-like Algorithms
Bogdan Crainicu
,
B. Iantovics
First International Conference on Complexity and…
2008
Corpus ID: 36337240
RC4 is one of the most widely used stream cipher. It is fairly simple and efficient, and is used, among other things, in WEP…
Expand
2006
2006
Key-Dependent Weak IVs and Weak Keys in WEP - How to Trace Conditions Back to Their Patterns -
K. Kobara
,
H. Imai
IEICE Transactions on Fundamentals of Electronics…
2006
Corpus ID: 17446271
The WEP (Wired Equivalent Privacy) is a part of IEEE 802.11 standard designed for protecting over the air communication. While…
Expand
2005
2005
Most IVs of FMS Attack-Resistant WEP Implementation Leak Secret Key Information
T. Ohigashi
2005
Corpus ID: 113229340
2005
2005
FMS Attack-Resistant WEP Implementation Is Still Broken
T. Ohigashi
,
Yoshiaki Shiraishi
,
M. Morii
International Conference on Computational…
2005
Corpus ID: 32809546
In this paper, we present an attack to break WEP that avoids weak IVs used in the FMS attack. Our attack is a known IV attack…
Expand
2005
2005
A Chosen IV Attack against FMS Attack-Resistant WEP Implementation
Ohigashi Toshihiro
,
Shiraishi Yoshiaki
,
Morii Masakatu
2005
Corpus ID: 67152010
2002
2002
Secure wireless gateway
Austin Godber
,
P. Dasgupta
WISE
2002
Corpus ID: 590614
Wireless LANs (WLAN), using the IEEE 802.11b standard, have been shown to be inherently insecure. Given the widespread use of…
Expand
2002
2002
A Security Analysis of the Wireless Networks ( IEEE 802 . 11 )
Sampath Thodupunuri
2002
Corpus ID: 1829188
The 802.11 standard for wireless networks includes a Wired Equivalent Privacy (WEP) protocol, used to protect link-layer…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE