Skip to search formSkip to main contentSkip to account menu

Weak key

Known as: Flat keyspace, Linear keyspace, Linear key space 
In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Key authentication as well as an intended recipient not having a key available are, among others, challenges that public key… 
2015
2015
Cloud computing is used to provide scalable services which are easily used over the internet as per the need basis. Cloud… 
2014
2014
A5/1 is a shift register based stream cipher which provides privacy for the GSM system. In this paper, we analyse the loading of… 
2012
2012
The MISTY1 block cipher has a 64-bit block length, a 128-bit user key and a recommended number of 8 rounds. It is a Japanese… 
2009
2009
Let N = pq be an LSBS-RSA modulus where primes p and q have the same bit-length and share the m least significant bits, and (p… 
2005
2005
In this paper, we describe a sequence of simple, yet efficient chosen-plaintext (or chosen-ciphertext) attacks against reduced… 
2004
2004
  • C. Prissette
  • 2004
  • Corpus ID: 24298596
This paper presents two families of weak keys, which can be combined to build a family of very weak keys. The detection algorithm… 
Highly Cited
2002
Highly Cited
2002
This paper presents a large collection of new weak-key classes for the IDEA cipher. The classes presented in this paper contain… 
1999
1999
RC6 has been submitted as a candidate for the Advanced Encryption Standard (AES). Two important features of RC6 that were absent… 
1993
1993
The block ciphers PES and IPES were originally designed with the ambition to become the successor of DES as a standard. In this…