6. In the discussion of the attack on RC4 keystream byte K3we showed that IVs of the form (3,255, V) are useful to the attacker. We also showed that IVs that are not of this form are sometimes useful to the attacker, and we gave the specific example of the (2,253,0). Find an IV of yet another form that is useful in the attack on K3.
Already registered? Login
Not Account? Sign up
Enter your email address to reset your password
Back to Login? Click here