نتایج جستجو برای: رمز رشته ای rc4

تعداد نتایج: 247422  

2013
Dr. Chander Kant Raksha

Securing biometrics databases from being compromised is major challenge, it must be overcome in order to support widespread use of biometrics based authentication. In this paper we present a cryptographic technique for enhanced security of fingerprint information using RC4 enrichment algorithm approach. RC4 algorithm is already used for image encryption. This paper is about encryption and decry...

2005
Johan H̊astad Mats Näslund

We propose a new stream cipher called “Polar Bear”. It combines constructions used successfully in other situations. The key initialization uses Rijndael, the steady state uses a dynamic table as in RC4 and we guarantee a long period through the use of a linear feedback shiftregister. The efficiency for short messages is better than that of RC4 while for long messages Polar Bear is about a fact...

Journal: :IACR Cryptology ePrint Archive 2005
Yassir Nawaz Kishan Chand Gupta Guang Gong

In this paper we propose a new 32-bit RC4 like keystream generator. The proposed generator produces 32 bits in each iteration and can be implemented in software with reasonable memory requirements. Our experiments show that this generator is 3.2 times faster than original 8-bit RC4. It has a huge internal state and offers higher resistance against state recovery attacks than the original 8-bit ...

Journal: :IACR Cryptology ePrint Archive 2007
Alexander Maximov

1 At FSE 2004 two new stream ciphers VMPC and RC4A have been proposed. VMPC is a generalisation of the stream cipher RC4, whereas RC4A is an attempt to increase the security of RC4 by introducing an additional permuter in the design. This paper is the first work presenting attacks on VMPC and RC4A. We propose two linear distinguishing attacks, one on VMPC of complexity 2, and one on RC4A of com...

Journal: :The Winnower 2015

Journal: :The Winnower 2015

Journal: :The Winnower 2015

2003
Souradyuti Paul Bart Preneel

The RC4 stream cipher is the most widely used software based stream cipher. It is based on a secret internal state of N = 256 bytes and two pointers. This paper proposes an efficient algorithm to compute a special set of RC4 states named non-fortuitous predictive states. These special states increase the probability to guess part of the internal state in a known plaintext attack and present a c...

Journal: :IACR Cryptology ePrint Archive 2017
Goutam Paul Souvik Ray

The internal state of RC4 stream cipher is a permutation over ZN and its state transition is effectively a transposition or swapping of two elements. How the randomness of RC4 state evolves due to its state transitions has been studied for many years. As the number of swaps increases, the state comes closer to a uniform random permutation. We call the burn-in period of RC4 state transition as t...

2012
Jaspreet Singh Sandeep Singh Kang

Wi-Fi is serving as a standard for broadband connectivity in homes, offices, and at many public locations. WEP is a security protocol for WLANs designed to give security equivalent to that provided on Wired Networks. It is a framework that uses RC4 encryption algorithm. Many flaws had been discovered in the RC4 algorithm by the experts. In the RC4 the encryption is performed by a ‘bit-by-bit’ ‘...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید