{"guid":"import-d37adcac32db0b17c2","title":"News Key Recovery Attacks on RC4/WEP","subtitle":null,"slug":"27c3-4261-en-key_recovery_attacks_rc4","link":"http://events.ccc.de/congress/2010/Fahrplan/events/4261.en.html","description":"In this paper, we present several weaknesses in the stream cipher RC4.\nFirst, we present a technique to automatically reveal linear\ncorrelations in the PRGA of RC4. \n","original_language":"eng","persons":["Martin Vuagnoux"],"view_count":124,"promoted":false,"date":"2010-12-30T01:00:00.000+01:00","release_date":"2011-01-04T01:00:00.000+01:00","updated_at":"2026-01-23T12:45:18.229+01:00","tags":["27c3"," Hacking"],"length":2528,"duration":2528,"thumb_url":"https://static.media.ccc.de/media/congress/2010/27c3-4261-en-key_recovery_attacks_rc4.jpg","poster_url":"https://static.media.ccc.de/media/congress/2010/27c3-4261-en-key_recovery_attacks_rc4_preview.jpg","timeline_url":"https://static.media.ccc.de/media/congress/2010/import-d37adcac32db0b17c2-timeline.jpg","thumbnails_url":"https://static.media.ccc.de/media/congress/2010/import-d37adcac32db0b17c2-thumbnails.vtt","frontend_link":"https://media.ccc.de/v/27c3-4261-en-key_recovery_attacks_rc4","url":"https://api.media.ccc.de/public/events/import-d37adcac32db0b17c2","conference_title":"27C3: We Come In Peace","conference_url":"https://api.media.ccc.de/public/conferences/27c3","related":[{"event_id":980,"event_guid":"import-bc2aaf07ba36dce54b","weight":1},{"event_id":1464,"event_guid":"import-faf44224642760650d","weight":1},{"event_id":1487,"event_guid":"import-31618b1a3c02facb8d","weight":1},{"event_id":1546,"event_guid":"import-5066545b91f6a498b5","weight":1},{"event_id":1569,"event_guid":"import-f08408f6dd676d9b53","weight":1},{"event_id":2269,"event_guid":"C4w30id6HpMnzKM2xcrT4g","weight":1}],"recordings":[{"size":394,"length":2528,"mime_type":"audio/ogg","language":"eng","filename":"27c3-4261-en-key_recovery_attacks_rc4.ogg","state":"downloaded","folder":"ogg-audio-only","high_quality":true,"width":720,"height":576,"updated_at":"2014-05-10T15:26:52.804+02:00","recording_url":"https://cdn.media.ccc.de/congress/2010/ogg-audio-only/27c3-4261-en-key_recovery_attacks_rc4.ogg","url":"https://api.media.ccc.de/public/recordings/2820","event_url":"https://api.media.ccc.de/public/events/import-d37adcac32db0b17c2","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":394,"length":2528,"mime_type":"video/webm","language":"eng","filename":"27c3-4261-en-key_recovery_attacks_rc4.webm","state":"downloaded","folder":"webm","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:43.805+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/webm/27c3-4261-en-key_recovery_attacks_rc4.webm","url":"https://api.media.ccc.de/public/recordings/2818","event_url":"https://api.media.ccc.de/public/events/import-d37adcac32db0b17c2","conference_url":"https://api.media.ccc.de/public/conferences/27c3"},{"size":394,"length":2528,"mime_type":"video/mp4","language":"eng","filename":"27c3-4261-en-key_recovery_attacks_rc4.mp4","state":"downloaded","folder":"mp4-h264-HQ","high_quality":true,"width":720,"height":576,"updated_at":"2016-01-27T11:03:43.775+01:00","recording_url":"https://cdn.media.ccc.de/congress/2010/mp4-h264-HQ/27c3-4261-en-key_recovery_attacks_rc4.mp4","url":"https://api.media.ccc.de/public/recordings/2819","event_url":"https://api.media.ccc.de/public/events/import-d37adcac32db0b17c2","conference_url":"https://api.media.ccc.de/public/conferences/27c3"}]}