CFP last date
20 January 2025
Reseach Article

Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher

by Nishith Sinha, Mallika Chawda, Kishore Bhamidipati
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 94 - Number 18
Year of Publication: 2014
Authors: Nishith Sinha, Mallika Chawda, Kishore Bhamidipati
10.5120/16459-6132

Nishith Sinha, Mallika Chawda, Kishore Bhamidipati . Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher. International Journal of Computer Applications. 94, 18 ( May 2014), 17-21. DOI=10.5120/16459-6132

@article{ 10.5120/16459-6132,
author = { Nishith Sinha, Mallika Chawda, Kishore Bhamidipati },
title = { Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher },
journal = { International Journal of Computer Applications },
issue_date = { May 2014 },
volume = { 94 },
number = { 18 },
month = { May },
year = { 2014 },
issn = { 0975-8887 },
pages = { 17-21 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume94/number18/16459-6132/ },
doi = { 10.5120/16459-6132 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T22:18:00.636200+05:30
%A Nishith Sinha
%A Mallika Chawda
%A Kishore Bhamidipati
%T Enhancing Security of Improved RC4 Stream Cipher by Converting into Product Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 94
%N 18
%P 17-21
%D 2014
%I Foundation of Computer Science (FCS), NY, USA
Abstract

RC4 is one of the most widely used stream ciphers which finds its application in many security protocols such as Wi-Fi Protocol Access (WPA) and Wired Equivalence Privacy (WEP). RC4 algorithm has several weaknesses. In order to overcome those weaknesses and enhance its security, numerous modifications have been suggested. These amendments destroy the basis of various cryptanalysis attacks on RC4. One such significant modification was the algorithm proposed by Jian Xie et al [1]. In this paper, we propose an enhancement to this algorithm by converting it into a product cipher and thereby enhancing its security.

References
  1. Jian Xie, Xiaozhong Pan, "An Improved RC4 Stream Cipher", International Conference on Computer Application and System Modeling (ICCASM), 2010
  2. Suhaila Omer Sharif, S. P. Mansoor, "Performance analysis of Stream Cipher algorithms", 3rd International Conference on Advanced Computer Theory and Engineering (ICATE), 2010. .
  3. C. S Lamba, "Design and Analysis of Stream Cipher for Network Security", 2nd International Conference on Communication Software and Networks,2010
  4. S. Fluthrer, I. Mantin, A. Shamir, "Weaknesses in the Key Scheduling Algorithm of RC4", SAC2001 (S. Vaudenay, A. Youssef,eds. ), col. 2259 of LNCS, pp. 1-24, springer-Verlag, 2001
  5. G. Paul, S. Maitra, "RC4 state in formation at Any Stage Reveals the Secret Key ", presented in the 14th Annual Workshop on Selected Areas in Cryptography, SAC 2007, August 16-17, Ottawa, Canada, LNCS (Springer) pages 360-377.
  6. A Klein, Attacks on the RC4 Stream Cipher, cage. ugent. be/~klein/RC4/RC4-en. ps
  7. S. Paul, B. Preneel, ?A New Weakness in the RC4 Key stream Generator and an Approach to Improve the Security of the Cipher?, Fast Software Encryption, 11th International Workshop, FSE 2004, Delhi, India, February 5-7, 2004. Revised Papers, vol. 3017, no. , pp. 245,259, 2004.
  8. William Stallings: "Cryptography and Network Security: Principles and Practices" 4th Edition,
  9. Cryptanalysis of Vigenère Cipher-http://www. nku. edu/~christensen/section%2012%20vigenere%20cryptanalysis. pdf
Index Terms

Computer Science
Information Sciences

Keywords

Cipher Security Stream Ciphers Product Ciphers