ABSTRACT

In the previous chapter, we presented a detailed analysis of the RC4 KSA and demonstrated different types of biases present in the permutation bytes. Here we discuss different algorithms for recovering the secret key of RC4 from the state information.