|
algorithmType
|
byte-oriented stream cipher
ⓘ
|
|
alsoKnownAs
|
RC4 stream cipher
ⓘ
surface form:
ARC4
|
|
alsoKnownAs
|
Alleged RC4
ⓘ
|
|
alsoKnownAs
|
RC4 stream cipher
ⓘ
surface form:
Rivest Cipher 4
|
|
blockSizeBits
|
1
ⓘ
|
|
cipherCategory
|
software-oriented cipher
ⓘ
|
|
considered
|
insecure
ⓘ
|
|
deprecatedBy
|
Google
ⓘ
|
|
deprecatedBy
|
Internet Engineering Task Force
ⓘ
surface form:
IETF
|
|
deprecatedBy
|
Microsoft
ⓘ
|
|
deprecatedBy
|
Mozilla
ⓘ
|
|
deprecatedIn
|
RFC 5246
ⓘ
surface form:
TLS 1.2
|
|
designGoal
|
fast in software
ⓘ
|
|
designGoal
|
simple implementation
ⓘ
|
|
designedBy
|
Ronald L. Rivest
ⓘ
surface form:
Ron Rivest
|
|
developedBy
|
RSA Security
ⓘ
|
|
firstPublicDescriptionPublishedOn
|
Cypherpunks mailing list
ⓘ
|
|
hasVulnerability
|
distinguishing attacks
ⓘ
|
|
hasVulnerability
|
key-stream bias
ⓘ
|
|
hasVulnerability
|
plaintext recovery attacks
ⓘ
|
|
hasVulnerability
|
related-key attacks
ⓘ
|
|
hasVulnerability
|
weaknesses in initial keystream bytes
ⓘ
|
|
influenced
|
RC4 stream cipher
self-linksurface differs
ⓘ
surface form:
RC4A
|
|
influenced
|
Spritz cipher
ⓘ
|
|
influenced
|
VMPC stream cipher
ⓘ
|
|
instanceOf
|
cryptographic algorithm
ⓘ
|
|
instanceOf
|
stream cipher
ⓘ
|
|
instanceOf
|
symmetric-key algorithm
ⓘ
|
|
keySizeMaxBits
|
2048
ⓘ
|
|
keySizeMinBits
|
40
ⓘ
|
|
keyType
|
symmetric key
ⓘ
|
|
knownFor
|
high software performance
ⓘ
|
|
knownFor
|
simplicity
ⓘ
|
|
knownFor
|
wide historical deployment
ⓘ
|
|
notSuitableFor
|
new systems
ⓘ
|
|
operatesOn
|
bytes
ⓘ
|
|
prohibitedIn
|
RFC 8446
ⓘ
surface form:
TLS 1.3
|
|
replacedBy
|
AES-based stream modes
ⓘ
|
|
replacedBy
|
ChaCha20
ⓘ
|
|
specificationLeakedIn
|
1994
ⓘ
|
|
standardizedAs
|
RFC 7465 (prohibition in TLS)
ⓘ
|
|
stateSizeBytes
|
256
ⓘ
|
|
stateStructure
|
permutation of 256-byte state array
ⓘ
|
|
status
|
deprecated
ⓘ
|
|
typicalKeySizeBits
|
128
ⓘ
|
|
usedIn
|
Microsoft Office encryption (legacy)
ⓘ
|
|
usedIn
|
Remote Desktop Protocol
ⓘ
surface form:
Microsoft Remote Desktop Protocol
|
|
usedIn
|
RC4-HMAC construction
ⓘ
|
|
usedIn
|
SSL
ⓘ
|
|
usedIn
|
TLS
ⓘ
|
|
usedIn
|
Wired Equivalent Privacy
ⓘ
surface form:
WEP
|
|
usedIn
|
WPA-TKIP
ⓘ
|
|
usesComponent
|
key-scheduling algorithm
ⓘ
|
|
usesComponent
|
pseudo-random generation algorithm
ⓘ
|
|
wasProprietaryUntil
|
1994
ⓘ
|
|
yearDesigned
|
1987
ⓘ
|