Weak Key - List of Algorithms With Weak Keys

List of Algorithms With Weak Keys

This list is incomplete; you can help by expanding it.
  • RC4. RC4's weak initialization vectors allow an attacker to mount a known-plaintext attack and have been widely used to compromise the security of WEP.
  • IDEA. IDEA's weak keys are identifiable in a chosen-plaintext attack. They make the relationship between the XOR sum of plaintext bits and ciphertext bits predictable. There is no list of these keys, but they can be identified by their "structure".
  • Data Encryption Standard
  • Blowfish. Blowfish's weak keys produce bad S-boxes, since Blowfish's S-boxes are key-dependent. There is a chosen plaintext attack against a reduced-round variant of Blowfish that is made easier by the use of weak keys. This is not a concern for full 16-round Blowfish.

Read more about this topic:  Weak Key

Famous quotes containing the words list of, list, weak and/or keys:

    Every morning I woke in dread, waiting for the day nurse to go on her rounds and announce from the list of names in her hand whether or not I was for shock treatment, the new and fashionable means of quieting people and of making them realize that orders are to be obeyed and floors are to be polished without anyone protesting and faces are to be made to be fixed into smiles and weeping is a crime.
    Janet Frame (b. 1924)

    We saw the machinery where murderers are now executed. Seven have been executed. The plan is better than the old one. It is quietly done. Only a few, at the most about thirty or forty, can witness [an execution]. It excites nobody outside of the list permitted to attend. I think the time for capital punishment has passed. I would abolish it. But while it lasts this is the best mode.
    Rutherford Birchard Hayes (1822–1893)

    It is the weak and confused who worship the pseudosimplicities of brutal directness.
    Marshall McLuhan (1911–1980)

    Thou hast the keys of Paradise, O just, subtle, and mighty opium!
    Thomas De Quincey (1785–1859)