• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar
  • HomePage
  • About
  • Syllabus
  • Schedule
    • Section 1
      • Week 1: Course Introduction
      • Week 2: Access Controls
      • Week 3: Systems Software Security
      • Week 4: Applications Software Security
      • Week 5: Cryptography Protocols
      • Week 6: Practical Cryptography
      • Week 7: Midterm Exam
    • Section 2
      • Week 8: Business Continuity & Disaster Recovery
      • Week 9: Security Operations
      • Week 10: Physical & Environmental Security
      • Week 11: Security Architecture & Design
      • Week 12: – Network Protocols
      • Week 13: Telecommunications and Network Security
      • Week 14: Risk Management and Compliance
      • Week 15: Final Exam
  • Course Material
    • Case Studies
      • C2.1 (9/12)
      • C4.1 (9/26)
      • C6.1 (10/10)
      • C8.1 (10/24)
      • C9.1 (10/31)
      • C10.1 (11/7)
      • C11.1 (11/14)
    • Practical Assignments
      • PA1.1 (Due 9/12)
      • PA2.1 (Due 9/26)
      • PA4.1 (Due 10/3)
      • PA5 (Due 10/17)
        • PA5.1
        • PA5.2
        • PA5.3
      • PA8.1 (Due 10/31)
      • PA9.1 (Due 11/7)
      • PA10.1 (Due 11/7)
      • PA11.1 ( Due 11/24)
      • PA12.1 (Due 11/28)
      • PA13 (Due 12/5)
        • PA13.1
        • PA13.2
        • PA13.3
    • Written Assignments
      • WA2.1 (Due 9/19)
      • WA3.1 (Due 9/26)
      • WA4.1 (Due 10/3)
      • WA6.1 (Due 10/17)
      • WA8.1 (Due 10/31)
      • WA9.1 (Due 11/7)
      • WA10.1 (Due 11/14)
      • WA12.1 (Due 11/28)
      • WA13.1 (Due 12/5)
  • Webex
  • Gradebook

ITACS 5209

Temple University

Week 6 Written Assignment

We learned about RC4 previously, which is a stream cypher algorithm.  Looking at the commands we used in OpenSSL, you may notice that there are very few stream cyphers available.  Given that RC4 is one of the few options, it is import to be aware of its vulnerabilities.  By studying the vulnerabilities discovered in RC4, it can help us understand the fallibility of all encryption algorithms, and can help us understand the risks and evaluating future vulnerabilities in other protocols assumed to be secure.

Read this academic paper that discusses some of the vulnerabilities discovered in RC4: http://www.isg.rhul.ac.uk/tls/RC4passwords.pdf

Summarize this paper’s findings, and how serious these concerns are to IT security practitioners. Research protocols and standards that rely on RC4, explain which may be at risk, and how to mitigate this risk.

Primary Sidebar

Weekly Discussions

  • Uncategorized (12)

Copyright © 2025 · Magazine Pro Theme on Genesis Framework · WordPress · Log in