<?xml version="1.0"?>
<feed xmlns="http://www.w3.org/2005/Atom" xml:lang="ko">
	<id>https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=RC4</id>
	<title>RC4 - 편집 역사</title>
	<link rel="self" type="application/atom+xml" href="https://wiki.mathnt.net/index.php?action=history&amp;feed=atom&amp;title=RC4"/>
	<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=RC4&amp;action=history"/>
	<updated>2026-04-04T17:36:17Z</updated>
	<subtitle>이 문서의 편집 역사</subtitle>
	<generator>MediaWiki 1.35.0</generator>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=RC4&amp;diff=51219&amp;oldid=prev</id>
		<title>2021년 2월 17일 (수) 08:03에 Pythagoras0님의 편집</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=RC4&amp;diff=51219&amp;oldid=prev"/>
		<updated>2021-02-17T08:03:40Z</updated>

		<summary type="html">&lt;p&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2021년 2월 17일 (수) 08:03 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l99&quot; &gt;99번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;99번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;== 메타데이터 ==&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;==메타데이터==&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt;−&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #ffe49c; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt; &lt;/div&gt;&lt;/td&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===위키데이터===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q846955 Q846955]&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;* ID :  [https://www.wikidata.org/wiki/Q846955 Q846955]&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===Spacy 패턴 목록===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LEMMA&amp;#039;: &amp;#039;RC4&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LEMMA&amp;#039;: &amp;#039;ARC4&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LEMMA&amp;#039;: &amp;#039;arcfour&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LOWER&amp;#039;: &amp;#039;rivest&amp;#039;}, {&amp;#039;LOWER&amp;#039;: &amp;#039;cipher&amp;#039;}, {&amp;#039;LEMMA&amp;#039;: &amp;#039;4&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* [{&amp;#039;LOWER&amp;#039;: &amp;#039;ron&amp;#039;}, {&amp;#039;LOWER&amp;#039;: &amp;quot;&amp;#039;s&amp;quot;}, {&amp;#039;LOWER&amp;#039;: &amp;#039;code&amp;#039;}, {&amp;#039;LEMMA&amp;#039;: &amp;#039;4&amp;#039;}]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=RC4&amp;diff=47016&amp;oldid=prev</id>
		<title>Pythagoras0: /* 메타데이터 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=RC4&amp;diff=47016&amp;oldid=prev"/>
		<updated>2020-12-26T12:15:18Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;메타데이터: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;table class=&quot;diff diff-contentalign-left diff-editfont-monospace&quot; data-mw=&quot;interface&quot;&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;col class=&quot;diff-marker&quot; /&gt;
				&lt;col class=&quot;diff-content&quot; /&gt;
				&lt;tr class=&quot;diff-title&quot; lang=&quot;ko&quot;&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;← 이전 판&lt;/td&gt;
				&lt;td colspan=&quot;2&quot; style=&quot;background-color: #fff; color: #202122; text-align: center;&quot;&gt;2020년 12월 26일 (토) 12:15 판&lt;/td&gt;
				&lt;/tr&gt;&lt;tr&gt;&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot; id=&quot;mw-diff-left-l98&quot; &gt;98번째 줄:&lt;/td&gt;
&lt;td colspan=&quot;2&quot; class=&quot;diff-lineno&quot;&gt;98번째 줄:&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;===소스===&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt; &lt;/td&gt;&lt;td style=&quot;background-color: #f8f9fa; color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #eaecf0; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;  &amp;lt;references /&amp;gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;== 메타데이터 ==&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;===위키데이터===&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;tr&gt;&lt;td colspan=&quot;2&quot;&gt; &lt;/td&gt;&lt;td class=&#039;diff-marker&#039;&gt;+&lt;/td&gt;&lt;td style=&quot;color: #202122; font-size: 88%; border-style: solid; border-width: 1px 1px 1px 4px; border-radius: 0.33em; border-color: #a3d3ff; vertical-align: top; white-space: pre-wrap;&quot;&gt;&lt;div&gt;&lt;ins style=&quot;font-weight: bold; text-decoration: none;&quot;&gt;* ID :  [https://www.wikidata.org/wiki/Q846955 Q846955]&lt;/ins&gt;&lt;/div&gt;&lt;/td&gt;&lt;/tr&gt;
&lt;/table&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
	<entry>
		<id>https://wiki.mathnt.net/index.php?title=RC4&amp;diff=46310&amp;oldid=prev</id>
		<title>Pythagoras0: /* 노트 */ 새 문단</title>
		<link rel="alternate" type="text/html" href="https://wiki.mathnt.net/index.php?title=RC4&amp;diff=46310&amp;oldid=prev"/>
		<updated>2020-12-21T11:11:56Z</updated>

		<summary type="html">&lt;p&gt;&lt;span dir=&quot;auto&quot;&gt;&lt;span class=&quot;autocomment&quot;&gt;노트: &lt;/span&gt; 새 문단&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;b&gt;새 문서&lt;/b&gt;&lt;/p&gt;&lt;div&gt;== 노트 ==&lt;br /&gt;
&lt;br /&gt;
===위키데이터===&lt;br /&gt;
* ID :  [https://www.wikidata.org/wiki/Q846955 Q846955]&lt;br /&gt;
===말뭉치===&lt;br /&gt;
# In cryptography, RC4 (Rivest Cipher 4 ) is the most widely used software stream cipher and is used in popular Internet protocols such as Transport Layer Security (TLS).&amp;lt;ref name=&amp;quot;ref_9dcb5040&amp;quot;&amp;gt;[https://support.venafi.com/hc/en-us/articles/215914607-How-To-How-do-I-disable-my-server-from-using-RC4 How To: How do I disable my server from using RC4]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# While remarkable for its simplicity and speed in software, RC4 has weaknesses that argue against its use in new systems.&amp;lt;ref name=&amp;quot;ref_9dcb5040&amp;quot; /&amp;gt;&lt;br /&gt;
# As of 2015, there is speculation that some state cryptologic agencies may possess the capability to break RC4 even when used in the TLS protocol.&amp;lt;ref name=&amp;quot;ref_9dcb5040&amp;quot; /&amp;gt;&lt;br /&gt;
# Mozilla and Microsoft recommend disabling RC4 where possible.&amp;lt;ref name=&amp;quot;ref_9dcb5040&amp;quot; /&amp;gt;&lt;br /&gt;
# Important: Multiple vulnerabilities have been discovered in the RC4 cipher, rendering it insecure.&amp;lt;ref name=&amp;quot;ref_8705cdf7&amp;quot;&amp;gt;[https://www.microfocus.com/documentation/visual-cobol/vc50pu6/CSWin/BKCJCJALGOS004.html RC4]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# RC4 was designed by Ron Rivest of RSA Security in 1987.&amp;lt;ref name=&amp;quot;ref_8705cdf7&amp;quot; /&amp;gt;&lt;br /&gt;
# It stands for &amp;quot;Rivest Cipher 4&amp;quot;, or alternatively for &amp;quot;Ron&amp;#039;s Code&amp;quot;.&amp;lt;ref name=&amp;quot;ref_8705cdf7&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 was a widely-used cipher which has the following related algorithms, RC2, RC5, and RC6.&amp;lt;ref name=&amp;quot;ref_8705cdf7&amp;quot; /&amp;gt;&lt;br /&gt;
# The remote host supports the use of RC4 in one or more cipher suites.&amp;lt;ref name=&amp;quot;ref_a6e91c73&amp;quot;&amp;gt;[https://www.tenable.com/plugins/nnm/7282 SSL RC4 Cipher Suites Supported (Bar Mitzvah)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The RC4 cipher is flawed in its generation of a pseudo-random stream of bytes so that a wide variety of small biases are introduced into the stream, decreasing its randomness.&amp;lt;ref name=&amp;quot;ref_a6e91c73&amp;quot; /&amp;gt;&lt;br /&gt;
# Overview ▾ Package rc4 implements RC4 encryption, as defined in Bruce Schneier&amp;#039;s Applied Cryptography.&amp;lt;ref name=&amp;quot;ref_8aee4a01&amp;quot;&amp;gt;[https://golang.org/pkg/crypto/rc4/ The Go Programming Language]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# RC4 uses symmetric key encryption algorithm.&amp;lt;ref name=&amp;quot;ref_57176abb&amp;quot;&amp;gt;[https://support.citrix.com/article/CTX205269 How do I Remove RC4 Ciphers in NetScaler?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# RC4 generates a key stream from the secret key and XORs it with plain text to produce the encrypted text.&amp;lt;ref name=&amp;quot;ref_57176abb&amp;quot; /&amp;gt;&lt;br /&gt;
# Even though implementation looks simple, RC4 is an encryption algorithm having some vulnerability at initial stages.&amp;lt;ref name=&amp;quot;ref_57176abb&amp;quot; /&amp;gt;&lt;br /&gt;
# NetScaler supports RC4 symmetric key encryption algorithm.&amp;lt;ref name=&amp;quot;ref_57176abb&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 is one of the most used software-based stream ciphers in the world.&amp;lt;ref name=&amp;quot;ref_c1ca9d93&amp;quot;&amp;gt;[https://www.tech-faq.com/rc4.html RC4 (Rivest Cipher 4)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# There are a number of weaknesses with the baseline RC4 algorithm that require additional analysis before including in new systems requiring cryptologic features.&amp;lt;ref name=&amp;quot;ref_c1ca9d93&amp;quot; /&amp;gt;&lt;br /&gt;
# Ron Rivest originally designed RC4 in 1987 when he was working for RSA Security.&amp;lt;ref name=&amp;quot;ref_c1ca9d93&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 creates a pseudorandom stream of bits that is also referred to as a keystream.&amp;lt;ref name=&amp;quot;ref_c1ca9d93&amp;quot; /&amp;gt;&lt;br /&gt;
# As part of our commitment to protect the privacy of our users, Mozilla will disable the insecure RC4 cipher in Firefox in late January 2016, beginning with Firefox 44.&amp;lt;ref name=&amp;quot;ref_cbd51a29&amp;quot;&amp;gt;[https://blog.mozilla.org/security/2015/09/11/deprecating-the-rc4-cipher/ Deprecating the RC4 Cipher]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# If you’re a web site operator and still rely on RC4, you need to enable some other ciphers, or Firefox users will be unable to reach you.&amp;lt;ref name=&amp;quot;ref_cbd51a29&amp;quot; /&amp;gt;&lt;br /&gt;
# Over the years, however, cryptanalysis of RC4 has resulted in better and better attacks against it.&amp;lt;ref name=&amp;quot;ref_cbd51a29&amp;quot; /&amp;gt;&lt;br /&gt;
# It has been known since 1995 that RC4 has certain biases that make it easier to attack.&amp;lt;ref name=&amp;quot;ref_cbd51a29&amp;quot; /&amp;gt;&lt;br /&gt;
# Since the RC4 Cipher is a stream cipher, it always operates in the same mode, which may be specified by the transformations “RC4” or “RC4/ECB/NoPadding”.&amp;lt;ref name=&amp;quot;ref_d20c68ab&amp;quot;&amp;gt;[https://thalesdocs.com/gphsm/ptk/5.5/docs/Content/PTK-J/Ciphers/RC4.htm RC4]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The RC4 Cipher requires either a SecretKeySpec or SafeNet ProtectToolkit-J provider RC4 Key during initialization.&amp;lt;ref name=&amp;quot;ref_d20c68ab&amp;quot; /&amp;gt;&lt;br /&gt;
# To create an appropriate SecretKeySpec, pass an array of up to 256 bytes and the algorithm name “RC4” to the SecretKeySpec constructor.&amp;lt;ref name=&amp;quot;ref_d20c68ab&amp;quot; /&amp;gt;&lt;br /&gt;
# The SafeNet ProtectToolkit-J RC4 key will return the string “RC4” as its algorithm name, “RAW” as its encoding.&amp;lt;ref name=&amp;quot;ref_d20c68ab&amp;quot; /&amp;gt;&lt;br /&gt;
# HTTPS supports several encryption techniques, one of them being the famous RC4 algorithm.&amp;lt;ref name=&amp;quot;ref_ab699551&amp;quot;&amp;gt;[https://www.rc4nomore.com/ RC4 NOMORE]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# At one point RC4 was used 50% of the time, with the estime around Februari 2015 being 30%.&amp;lt;ref name=&amp;quot;ref_ab699551&amp;quot; /&amp;gt;&lt;br /&gt;
# Our RC4 NOMORE attack exposes weaknesses in this RC4 encryption algorithm.&amp;lt;ref name=&amp;quot;ref_ab699551&amp;quot; /&amp;gt;&lt;br /&gt;
# Update October 2017: We are pleased to say that, together with other work on RC4, our work influenced major browsers to disable RC4.&amp;lt;ref name=&amp;quot;ref_ab699551&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 uses a variable key and stream cipher method.&amp;lt;ref name=&amp;quot;ref_02bfdcb1&amp;quot;&amp;gt;[https://encyclopedia2.thefreedictionary.com/RC4+Cipher RC4 Cipher]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The RC4 algorithm, as used in the TLS protocol and SSL protocol, could allow a remote attacker to obtain sensitive information.&amp;lt;ref name=&amp;quot;ref_ad7d96fe&amp;quot;&amp;gt;[https://www.ibm.com/support/pages/security-bulletin-vulnerability-rc4-stream-cipher-affects-ibm-i-cve-2015-2808 Security Bulletin: Vulnerability in RC4 stream cipher affects IBM i (CVE-2015-2808)]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Not disabling the RC4 stream cipher will expose yourself to the attack described above.&amp;lt;ref name=&amp;quot;ref_ad7d96fe&amp;quot; /&amp;gt;&lt;br /&gt;
# IBM recommends that you review your entire environment to identify other areas where you have enabled the RC4 stream cipher and take appropriate mitigation and remediation actions.&amp;lt;ref name=&amp;quot;ref_ad7d96fe&amp;quot; /&amp;gt;&lt;br /&gt;
# After loading the System SSL fixes listed in this bulletin, applications coded to use the default values will no longer negotiate the use of RC4 cipher suites with peers.&amp;lt;ref name=&amp;quot;ref_ad7d96fe&amp;quot; /&amp;gt;&lt;br /&gt;
# We recently removed support for RC4 for browsers using TLS 1.1+.&amp;lt;ref name=&amp;quot;ref_c043cf0e&amp;quot;&amp;gt;[https://blog.cloudflare.com/killing-rc4-the-long-goodbye/ Killing RC4: The Long Goodbye]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Now we are removing RC4 as the preferred cipher.&amp;lt;ref name=&amp;quot;ref_c043cf0e&amp;quot; /&amp;gt;&lt;br /&gt;
# Servers behind CloudFlare will prefer AES-based cipher suites for all HTTPS connections and only use RC4 as a cipher as a last resort.&amp;lt;ref name=&amp;quot;ref_c043cf0e&amp;quot; /&amp;gt;&lt;br /&gt;
# The immediate workaround was to get servers to prefer a non-CBC cipher and the only good widely-supported candidate was RC4.&amp;lt;ref name=&amp;quot;ref_c043cf0e&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 Stream Cipher and Its Variants is the first book to fully cover the popular software stream cipher RC4.&amp;lt;ref name=&amp;quot;ref_2fcbd85b&amp;quot;&amp;gt;[https://www.routledge.com/RC4-Stream-Cipher-and-Its-Variants/Paul-Maitra/p/book/9780367382162 RC4 Stream Cipher and Its Variants]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# With extensive expertise in stream cipher cryptanalysis and RC4 research, the authors focus on the analysis and design issues of RC4.&amp;lt;ref name=&amp;quot;ref_2fcbd85b&amp;quot; /&amp;gt;&lt;br /&gt;
# After an introduction to the vast field of cryptology, the book reviews hardware and software stream ciphers and describes RC4.&amp;lt;ref name=&amp;quot;ref_2fcbd85b&amp;quot; /&amp;gt;&lt;br /&gt;
# It presents a theoretical analysis of RC4 KSA, discussing biases of the permutation bytes toward secret key bytes and absolute values.&amp;lt;ref name=&amp;quot;ref_2fcbd85b&amp;quot; /&amp;gt;&lt;br /&gt;
# A chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in this paper.&amp;lt;ref name=&amp;quot;ref_ebe87045&amp;quot;&amp;gt;[https://www.sciencedirect.com/science/article/pii/S1877050915001933 RC4 Encryption-A Literature Survey ☆]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# We have summarized the various weaknesses of RC4 algorithm followed by the recently proposed enhancements available in the literature.&amp;lt;ref name=&amp;quot;ref_ebe87045&amp;quot; /&amp;gt;&lt;br /&gt;
# These flaws in RC4 are still offering an open challenge for developers.&amp;lt;ref name=&amp;quot;ref_ebe87045&amp;quot; /&amp;gt;&lt;br /&gt;
# Hence our chronological survey corroborates the fact that even though researchers are working on RC4 stream cipher since last two decades, it still offers a plethora of research issues.&amp;lt;ref name=&amp;quot;ref_ebe87045&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 (also known as ARC4) is a stream cipher used in popular protocols such as SSL and WEP.&amp;lt;ref name=&amp;quot;ref_e7b46c15&amp;quot;&amp;gt;[https://cryptii.com/pipes/rc4-encryption RC4 / ARC4 encryption and decryption online]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# This strike simulates a TLS handshake using an RC4 cipher suite.&amp;lt;ref name=&amp;quot;ref_cf571ebc&amp;quot;&amp;gt;[https://support.ixiacom.com/strikes/analysis/tls/rfc7465_rc4_cipher_deprecation.xml TLS RC4 Cipher Deprecation]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# As of RFC7465, the RC4 cipher suite has been deprecated due to a number of exploits capable of decrypting portions of RC4 encrypted messages.&amp;lt;ref name=&amp;quot;ref_cf571ebc&amp;quot; /&amp;gt;&lt;br /&gt;
# In the first scenario, the client will send a mix of supported cipher suites, including RC4 cipher suites.&amp;lt;ref name=&amp;quot;ref_cf571ebc&amp;quot; /&amp;gt;&lt;br /&gt;
# The server will select an RC4 suite.&amp;lt;ref name=&amp;quot;ref_cf571ebc&amp;quot; /&amp;gt;&lt;br /&gt;
# So SSLCipherSuite ALL:!RC4 will enable every openssl cipher except for RC4.&amp;lt;ref name=&amp;quot;ref_bc7ab2b7&amp;quot;&amp;gt;[https://serverfault.com/questions/792096/disable-rc4-cipher-for-apache-2-2 Disable RC4 cipher for Apache 2.2]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# It’s been more than 25 years since Ron Rivest invented his RC4 stream cipher, and after all that time it’s still being used widely, which is something of an achievement in the crypto world.&amp;lt;ref name=&amp;quot;ref_ab8604e8&amp;quot;&amp;gt;[https://threatpost.com/attack-exploits-weakness-rc4-cipher-decrypt-user-sessions-031413/77628/ Attack Exploits Weakness in RC4 Cipher to Decrypt User Sessions]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# However, for more than 15 years researchers have known about a weakness in RC4 that could enable an attacker to decrypt the keystream.&amp;lt;ref name=&amp;quot;ref_ab8604e8&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 is a stream cipher, so it encrypts plaintext by mixing it with a series of random bytes, making it impossible for anyone to decrypt it without having the same key used to encrypt it.&amp;lt;ref name=&amp;quot;ref_ab8604e8&amp;quot; /&amp;gt;&lt;br /&gt;
# But as far as we knew, there was no way to attack this in RC4 in the way it’s used in SSL.&amp;lt;ref name=&amp;quot;ref_ab8604e8&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 means Rivest Cipher 4 invented by Ron Rivest in 1987 for RSA Security.&amp;lt;ref name=&amp;quot;ref_12267f10&amp;quot;&amp;gt;[https://www.geeksforgeeks.org/what-is-rc4-encryption/ What is RC4 Encryption?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# RC4 stream cipher is one of the most widely used stream ciphers because of its simplicity and speed of operation.&amp;lt;ref name=&amp;quot;ref_12267f10&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 was designed by Ron Rivest in 1987.&amp;lt;ref name=&amp;quot;ref_12267f10&amp;quot; /&amp;gt;&lt;br /&gt;
# Rivest Cipher 4 is an official name while it is also known as Ron’s Code.&amp;lt;ref name=&amp;quot;ref_12267f10&amp;quot; /&amp;gt;&lt;br /&gt;
# This document requires that Transport Layer Security (TLS) clients and servers never negotiate the use of RC4 cipher suites when they establish connections.&amp;lt;ref name=&amp;quot;ref_4e26b431&amp;quot;&amp;gt;[https://tools.ietf.org/html/rfc7465 Prohibiting RC4 Cipher Suites]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# As a result, RC4 can no longer be seen as providing a sufficient level of security for TLS sessions.&amp;lt;ref name=&amp;quot;ref_4e26b431&amp;quot; /&amp;gt;&lt;br /&gt;
# TLS clients MUST NOT include RC4 cipher suites in the ClientHello message.&amp;lt;ref name=&amp;quot;ref_4e26b431&amp;quot; /&amp;gt;&lt;br /&gt;
# o TLS servers MUST NOT select an RC4 cipher suite when a TLS client sends such a cipher suite in the ClientHello message.&amp;lt;ref name=&amp;quot;ref_4e26b431&amp;quot; /&amp;gt;&lt;br /&gt;
# Vulnerabilities in SSL RC4 Cipher Suites is a Medium risk vulnerability that is one of the most frequently found on networks around the world.&amp;lt;ref name=&amp;quot;ref_374c9049&amp;quot;&amp;gt;[https://beyondsecurity.com/scan-pentest-network-vulnerabilities-ssl-rc4-cipher-suites-supported.html Finding and Fixing SSL RC4 Cipher Suites Supported Vulnerability]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Reconfigure the affected application, if possible, to avoid use of RC4 ciphers.&amp;lt;ref name=&amp;quot;ref_374c9049&amp;quot; /&amp;gt;&lt;br /&gt;
# Vulnerabilities in SSL RC4 Cipher Suites Supported is a Medium risk vulnerability that is also high frequency and high visibility.&amp;lt;ref name=&amp;quot;ref_374c9049&amp;quot; /&amp;gt;&lt;br /&gt;
# A recently published paper described an attack that can break the RC4 cipher and decrypt user cookies.&amp;lt;ref name=&amp;quot;ref_82a49849&amp;quot;&amp;gt;[https://searchsecurity.techtarget.com/answer/Should-the-RC4-cipher-still-be-used-in-enterprises Should the RC4 cipher still be used in enterprises?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# While RC4 has long been known to be flawed, attacks against it have not been practical in real-world scenarios.&amp;lt;ref name=&amp;quot;ref_82a49849&amp;quot; /&amp;gt;&lt;br /&gt;
# Back in 2013, it seemed that RC4 was coming to the end of its useful life due to the increasing number of cryptographic weaknesses being discovered.&amp;lt;ref name=&amp;quot;ref_82a49849&amp;quot; /&amp;gt;&lt;br /&gt;
# The attack uses biases in the RC4 keystream to recover plaintext.&amp;lt;ref name=&amp;quot;ref_82a49849&amp;quot; /&amp;gt;&lt;br /&gt;
# Could you explain the recent flaw that was discovered in the RC4 encryption algorithm?&amp;lt;ref name=&amp;quot;ref_9b85d12a&amp;quot;&amp;gt;[https://searchsecurity.techtarget.com/answer/RC4-attack-details-Can-the-RC4-encryption-algorithm-protect-SSL-TLS RC4 attack details: Can the RC4 encryption algorithm protect SSL/TLS?]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# RC4 (Rivest Cipher 4) was designed by Ron Rivest of RSA Security back in 1987 and has become the most widely used stream cipher because of its speed and simplicity.&amp;lt;ref name=&amp;quot;ref_9b85d12a&amp;quot; /&amp;gt;&lt;br /&gt;
# A flaw disclosed recently by Dan Bernstein, a professor at the University of Illinois, allows an attacker to recover a limited amount of plaintext from a TLS connection when RC4 encryption is used.&amp;lt;ref name=&amp;quot;ref_9b85d12a&amp;quot; /&amp;gt;&lt;br /&gt;
# The RC4 attack applies to all versions of SSL and TLS that support the algorithm.&amp;lt;ref name=&amp;quot;ref_9b85d12a&amp;quot; /&amp;gt;&lt;br /&gt;
# &amp;quot;This server uses the RC4 cipher algorithm which is not secure.&amp;lt;ref name=&amp;quot;ref_f0587d60&amp;quot;&amp;gt;[https://docs.digicert.com/certificate-tools/discovery-user-guide/tlsssl-endpoint-vulnerabilities/rc4-cipher-enabled/ RC4 cipher enabled]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# RC4 is a stream cipher designed by Ron Rivest in 1987.&amp;lt;ref name=&amp;quot;ref_f0587d60&amp;quot; /&amp;gt;&lt;br /&gt;
# However, if you were unable to enable TLS 1.1 and TLS 1.2, a workaround is provided: Configure SSL to prioritize RC4 ciphers over block-based ciphers.&amp;lt;ref name=&amp;quot;ref_f0587d60&amp;quot; /&amp;gt;&lt;br /&gt;
# This library implements the Alleged RC4 cipher, which is described for example in Applied Cryptography.&amp;lt;ref name=&amp;quot;ref_f1015625&amp;quot;&amp;gt;[https://www.openssl.org/docs/man1.1.0/man3/RC4.html man1.1.0]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# RC4() encrypts or decrypts the len bytes of data at indata using key and places the result at outdata.&amp;lt;ref name=&amp;quot;ref_f1015625&amp;quot; /&amp;gt;&lt;br /&gt;
# Q: What can we do to limit or exclude the use of the RC4 stream cipher on our Windows platforms?&amp;lt;ref name=&amp;quot;ref_889c932d&amp;quot;&amp;gt;[https://www.itprotoday.com/compute-engines/disabling-rc4-cipher Disabling the RC4 Cipher]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# A: Microsoft recommends that customers use Transport Layer Security 1.2 (TLS) 1.2 and the more secure Advanced Encryption Standard - Galois/Counter Mode (AES-GCM) cipher as the RC4 alternative.&amp;lt;ref name=&amp;quot;ref_889c932d&amp;quot; /&amp;gt;&lt;br /&gt;
# Internet Explorer 11 (IE 11), which is bundled with Windows 8.1, enables TLS 1.2 by default and no longer uses RC4 during the SSL/TLS handshake.&amp;lt;ref name=&amp;quot;ref_889c932d&amp;quot; /&amp;gt;&lt;br /&gt;
# Windows clients that have these registry entries set won&amp;#039;t be able to connect to sites that require RC4.&amp;lt;ref name=&amp;quot;ref_889c932d&amp;quot; /&amp;gt;&lt;br /&gt;
# In cryptography, RC4 (Rivest Cipher 4 also known as ARC4 or ARCFOUR meaning Alleged RC4, see below) is a stream cipher.&amp;lt;ref name=&amp;quot;ref_a9491e0f&amp;quot;&amp;gt;[https://en.wikipedia.org/wiki/RC4 Wikipedia]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# The leaked code was confirmed to be genuine as its output was found to match that of proprietary software using licensed RC4.&amp;lt;ref name=&amp;quot;ref_a9491e0f&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 generates a pseudorandom stream of bits (a keystream).&amp;lt;ref name=&amp;quot;ref_a9491e0f&amp;quot; /&amp;gt;&lt;br /&gt;
# Several operating systems include arc4random , an API originating in OpenBSD providing access to a random number generator originally based on RC4.&amp;lt;ref name=&amp;quot;ref_a9491e0f&amp;quot; /&amp;gt;&lt;br /&gt;
# RC4 generates a pseudo-random stream of bits (a key-stream).&amp;lt;ref name=&amp;quot;ref_13854fdf&amp;quot;&amp;gt;[https://paginas.fe.up.pt/~ei10109/ca/rc4.html How does RC4 works]&amp;lt;/ref&amp;gt;&lt;br /&gt;
# Figure taken from http://www.networklife.net/2009/07/etude-de-wep-et-rivest-cipher-4/ The lookup stage of RC4.&amp;lt;ref name=&amp;quot;ref_13854fdf&amp;quot; /&amp;gt;&lt;br /&gt;
===소스===&lt;br /&gt;
 &amp;lt;references /&amp;gt;&lt;/div&gt;</summary>
		<author><name>Pythagoras0</name></author>
	</entry>
</feed>