PC-RC4 Algorithm: An Enhancement Over Standard RC4 Algorithm

نویسنده

  • Pushpendra Kumar Pateriya
چکیده

RC4 is most widely used stream cipher. In many standard security protocols is used the RC4 like in Wi-Fi Protocol Access (WPA) and Wired Equivalence Privacy (WEP). Here we propose a new enhanced RC4 algorithm named as PC-RC4. It is an extension of standard RC4 Algorithm. The basic purpose of this enhancement is to making strong RC4 algorithm. RC4 stream cipher is basically two stages process named: KSA & PRGA. The weakness and attacks are found in both the stages of RC4. In this context, this paper is trying to making strong to both the stages of RC4 Stream Cipher. The backbone of the RC4 algorithm is shuffling operation in both the stages KSA & PRGA. In the PC-RC4 Stream cipher is improved randomness in KSA as well as in PRGA to make it strong. In this paper we studied and analyzed some potential vulnerabilities of RC4 algorithm and proposed some appropriate changes on standard RC4 algorithm to overcome. A pragmatic approach used to analyze PC-RC4 in different scenarios.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R

We find statistical weaknesses in 20 RC4-like algorithms including the original RC4, RC4A, PC-RC4 and others. This is achieved using a simple statistical test. We found only one algorithm which was able to pass the test VMPC-R. This algorithm, being approximately three times more complex then RC4, is probably the simplest RC4-like cipher capable of producing pseudo-random output.

متن کامل

RC4 Enrichment Algorithm Approach for Selective Image Encryption

This paper is introduces RC4 Enrichment Algorithm Approach for selective image encryption. This approach is derived from the standard RC4 algorithm. RC4 algorithm is already used for image encryption and also for the selective image encryption. Currently RC4 is vulnerable. Lots of cryptanalytic found the lots of weakness, vulnerable point and attacks inside the RC4 algorithm. So in this concern...

متن کامل

Implementation of Wlan Wep Protocol by Rc4 Algorithm in Vhdl

The WLAN is a network that utilizes radio frequency technology. The security of wireless data stream becomes particularly prominent. The WLAN uses RC4 stream encryption algorithm of the WEP protocol to enhance its Security.WEP itself also has fatal Security flaws, tampering with the data for a variety of active attacks. In essence, the problem is not in RC4 itself but in the way to generate the...

متن کامل

Multiple Selective Regions Image Cryptography on Modified RC4 Stream Cipher

Cryptography is the technique which is utilized for secure communication over the network. By using Cryptography technique readable information is converted into an unreadable form. Cryptography is used to protect data from unauthorized access. Universality of security in modern internet based application is an explicit motivation to contribute in the area of Information Security. Multimedia da...

متن کامل

Analysis of RC4 and Proposal of Additional Layers for Better Security Margin

In this paper, the RC4 Key Scheduling Algorithm (KSA) is theoretically studied to reveal non-uniformity in the expected number of times each value of the permutation is touched by the indices i, j. Based on our analysis and the results available in literature regarding the existing weaknesses of RC4, few additional layers over the RC4 KSA and RC4 Pseudo-Random Generation Algorithm (PRGA) are pr...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2012