نتایج جستجو برای: رمز رشته ای rc4

تعداد نتایج: 247422  

Journal: :CoRR 2012
Rourab Paul Sangeet Saha J. K. M. Sadique Uz Zaman Suman Das Amlan Chakrabarti Ranjan Ghosh

AND ITS IMPLEMENTATION IN FPGA COPROCESSOR FOR SECURED ETHERNET COMMUNICATION Rourab Paul, Sangeet Saha, J K M Sadique Uz Zaman, Suman Das, Amlan Chakrabarti and Ranjan Ghosh Email :{rourabpaul, sangeet.saha87, jkmsadique, aami.suman}@gmail.com, [email protected], [email protected] A.K.Choudhury School of Information Technology , Dept. of Computer Science and Engineering and Institute of ...

2014
Priya Nagar N. B. Hulle Bhabani P. Sinha

RC4 Stream cipher is well known for its simplicity and ease to develope in software. But here, in the proposed design we have heighlighted the modified hardware implémentation of RC4. As RC4 is the most popular stream cipher. The proposed design performs reading and swapping simultaneously in one clock cycle. The proposed design also highlights the adder part which enhances the architecture spe...

2005
Alexander Maximov

At FSE 2004 two new stream ciphers VMPC and RC4A have been proposed. VMPC is a generalisation of the stream cipher RC4, whereas RC4A is an attempt to increase the security of RC4 by introducing an additional permuter in the design. This paper is the first work presenting attacks on VMPC and RC4A. We propose two linear distinguishing attacks, one on VMPC of complexity 2, and one on RC4A of compl...

2010
Pouyan Sepehrdad Serge Vaudenay Martin Vuagnoux

In this paper, we present several weaknesses in the stream cipher RC4. First, we present a technique to automatically reveal linear correlations in the PRGA of RC4. With this method, 48 new exploitable correlations have been discovered. Then we bind these new biases in the PRGA with known KSA weaknesses to provide practical key recovery attacks. Henceforth, we apply a similar technique on RC4 a...

2012
N. B. Hulle

This paper presents novel hardware implementation of modified RC4 stream cipher for wireless network security. The Modified RC4 algorithm proposes two changes in conventional RC4 stream cipher algorithm, one in Key Scheduling Algorithm (KSA) stage and other in Pseudorandom Generation Algorithm (PRGA) stage. This modification in KSA removed many weakness and produces random states, so that it wi...

Journal: :IACR Cryptology ePrint Archive 2013
Jing Lv Dongdai Lin

The stream cipher RC4 was designed by R.Rivest in 1987, and it is a widely deployed cipher. Many predictive states of RC4 for some special indices i were presented in the last 20 years. In this paper, we present several long term predictive states. These states increase the probability to guess part of the internal state in a known plaintext attack and present a cryptanalytic weakness of RC4. T...

Journal: :IACR Cryptology ePrint Archive 2002
Ilya Mironov

Most guidelines for implementation of the RC4 stream cipher recommend discarding the first 256 bytes of its output. This recommendation is based on the empirical fact that known attacks can either cryptanalyze RC4 starting at any point, or become harmless after these initial bytes are dumped. The motivation for this paper is to find a conservative estimate for the number of bytes that should be...

Journal: :IACR Cryptology ePrint Archive 2006
Sergey Doroshenko Boris Ryabko

The output of RC4 was analyzed using the ”book stack” test for randomness from [7]. It is experimentally shown that the keystream generated from RC4 can be distinguished from random with about 232 output bits.

2012
Jaya Dofe Manish Patil

— In this project work, an efficient hardware Implementation of modified RC4 stream-cipher is proposed. In contrary to previous design, which requires four memories each of size 256 X 8, the proposed system can be implemented by using only two memories each of size 128 X 7. Due to the reduction in the memory size the strength of encryption can be increased. Design of RC4 stream cipher for data ...

1998
Lars R. Knudsen Willi Meier Bart Preneel Vincent Rijmen Sven Verdoolaege

The security of the alleged RC4 stream cipher and some variants is investigated. Cryptanalytic algorithms are developed for a known plaintext attack where only a small segment of plaintext is assumed to be known. The analysis methods reveal intrinsic properties of alleged RC4 which are independent of the key scheduling and the key size. The complexity of one of the attacks is estimated to be le...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید