Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Weak key

Known as: Flat keyspace, Linear keyspace, Linear key space 
In cryptography, a weak key is a key, which, used with a specific cipher, makes the cipher behave in some undesirable way. Weak keys usually… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
The demand for more efficient ciphers is a likely to sharpen with new generation of products and applications. Previous cipher… Expand
  • figure 1
  • figure 2
  • table 1
  • figure 3
  • table 2
Is this relevant?
2013
2013
We present attacks on full Hummingbird-2 which are able to recover the 128-bit secret keys of two black box cipher instances that… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2011
Highly Cited
2011
The principal goal guiding the design of any encryption algorithm must be security against unauthorized attacks. However, for all… Expand
  • figure 1
  • table I
  • figure 2
  • table II
  • figure 4
Is this relevant?
Highly Cited
2009
Highly Cited
2009
In this paper we present two related-key attacks on the full AES. For AES-256 we show the first key recovery attack that works… Expand
  • table 1
  • figure 1
  • figure 2
  • figure 3
  • figure 4
Is this relevant?
Highly Cited
2002
Highly Cited
2002
This paper presents a large collection of new weak-key classes for the IDEA cipher. The classes presented in this paper contain… Expand
  • figure 1
  • table 1
  • figure 2
  • figure 3
  • table 2
Is this relevant?
Highly Cited
2001
Highly Cited
2001
In this paper we present several weaknesses in the key scheduling algorithm of RC4, and describe their cryptanalytic significance… Expand
  • figure 8
Is this relevant?
Highly Cited
2001
Highly Cited
2001
We show that it is possible to know whether the secret Goppa code of an instance of the McEliece public-key cryptosystem was… Expand
Is this relevant?
Highly Cited
2000
Highly Cited
2000
One of the basic problems in cryptography is the generation of a common secret key between two parties, for instance in order to… Expand
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Blowfish, a new secret-key block cipher, is proposed. It is a Feistel network, iterating a simple encryption function 16 times… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 7
Is this relevant?
Highly Cited
1993
Highly Cited
1993
Large classes of weak keys have been found for the block cipher algorithm IDEA, previously known as IPES [2]. IDEA has a 128- bit… Expand
Is this relevant?