Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Weak key

Known as: Flat keyspace, Linear keyspace, Linear key space 
In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The demand for more efficient ciphers is a likely to sharpen with new generation of products and applications. Previous cipher… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Highly Cited
2011
Highly Cited
2011
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 4
Highly Cited
2009
Highly Cited
2009
In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
2007
2007
The reflection attack is a recently discovered self similarity analysis which is usually mounted on ciphers with many fixed… Expand
  • table 1
  • figure 1
  • figure 2
Highly Cited
2002
Highly Cited
2002
This paper presents a large collection of new weak-key classes for the IDEA cipher. The classes presented in this paper contain… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Highly Cited
2001
Highly Cited
2001
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance… Expand
  • figure 8
Highly Cited
2001
Highly Cited
2001
We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was… Expand
Highly Cited
2000
Highly Cited
2000
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to… Expand
Highly Cited
1993
Highly Cited
1993
Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Highly Cited
1993
Highly Cited
1993
Large classes of weak keys have been found for the block cipher algorithm IDEA, previously known as IPES [2]. IDEA has a 128- bit… Expand