Hello,
First of all great work implementing the Klein style attacks in this manner.
Does this style of attack have any applicability to the following scenario, using RC4 to "sign" a nonce?:
3 byte nonce concatenated with 16 byte long term key > RC4 Keystream Generator > 259 bytes keystream output
Discard first 256 bytes of keystream leaving only last 3 bytes "result"
Nonce / Result pairs are only information sent publicly
Hello,
First of all great work implementing the Klein style attacks in this manner.
Does this style of attack have any applicability to the following scenario, using RC4 to "sign" a nonce?:
3 byte nonce concatenated with 16 byte long term key > RC4 Keystream Generator > 259 bytes keystream output
Discard first 256 bytes of keystream leaving only last 3 bytes "result"
Nonce / Result pairs are only information sent publicly