rc4 stream cipher
Recently Published Documents


TOTAL DOCUMENTS

52
(FIVE YEARS 8)

H-INDEX

9
(FIVE YEARS 1)

2021 ◽  
Vol 12 (02) ◽  
pp. 46-53
Author(s):  
Bobi Akbar

In data communication, against a data security method known as cryptography (Cryptography). Cryptography is a data security method that can be used to maintain data confidentiality, data authenticity or integrity, and the authenticity of the sender. This method is intended so that important information of a limited or confidential nature sent through public telecommunications facilities cannot be known or utilized by unauthorized parties. In this case, data security is also needed at the internet cafe (internet cafe). Warnet which is a place that provides Interconnection Networking that connects computers to form a network system that covers the whole world (global). Each cafe requires a billing system that is used to determine the state of the user in using the facilities at the cafe, starting from how long it takes to use and how much it costs each user. For this reason, so that the data on the billing system cannot be manipulated or modified by unauthorized persons, it is necessary to secure data. The data security method that will be used is cryptography, especially by using the RC4 stream cipher.


2021 ◽  
Vol 11 (20) ◽  
pp. 9646
Author(s):  
Evaristo José Madarro-Capó ◽  
Carlos Miguel Legón-Pérez ◽  
Omar Rojas ◽  
Guillermo Sosa-Gómez

In the last three decades, the RC4 has been the most cited stream cipher, due to a large amount of research carried out on its operation. In this sense, dissimilar works have been presented on its performance, security, and usability. One of the distinguishing features that stand out the most is the sheer number of RC4 variants proposed. Recently, a weakness has been reported regarding the existence of statistical dependence between the inputs and outputs of the RC4, based on the use of the strict avalanche criterion and the bit independence criterion. This work analyzes the influence of this weakness in some of its variants concerning RC4. The five best-known variants of RC4 were compared experimentally and classified into two groups according to the presence or absence of such a weakness.


Entropy ◽  
2021 ◽  
Vol 23 (7) ◽  
pp. 896
Author(s):  
Evaristo José Madarro-Capó ◽  
Carlos Miguel Legón-Pérez ◽  
Omar Rojas ◽  
Guillermo Sosa-Gómez

This paper presents a criterion, based on information theory, to measure the amount of average information provided by the sequences of outputs of the RC4 on the internal state. The test statistic used is the sum of the maximum plausible estimates of the entropies H(jt|zt), corresponding to the probability distributions P(jt|zt) of the sequences of random variables (jt)t∈T and (zt)t∈T, independent, but not identically distributed, where zt are the known values of the outputs, while jt is one of the unknown elements of the internal state of the RC4. It is experimentally demonstrated that the test statistic allows for determining the most vulnerable RC4 outputs, and it is proposed to be used as a vulnerability metric for each RC4 output sequence concerning the iterative probabilistic attack.


In the modern world with the emergence of technology, the entire network includes the digital data that adds new dimensions as to how data can be exchanged effectively and safely in real time from one part of the world to another. Such new opportunities are followed by obstacles such as keeping information confidential and secret or data that is a lively area to explore. It is necessary to transform the information into cryptic form to safely transfer the information from intruders, so that the information is concealed from the intruders. Researchers have always found it fascinating to establish safe techniques that would allow the data to reach from the sender without exposing it to third parties. Therefore several techniques have been developed to transfer data securely and steganography is one of them. In this paper, we review numerous research papers on different techniques of encryption and steganography. This paper contains details about the RC4 encryption algorithm, and how steganography and encryption methods are used. The cryptography and steganography techniques ensure the security of the data.


2020 ◽  
Vol 20 ◽  
pp. 12-16
Author(s):  
N. Kukharska ◽  
Yu. Kordunova ◽  
I. Khomych

The paper substantiates the feasibility of integrating as one software solution cryptographic and steganographic ap-proaches to information security and developed two cryptoseganosystems to protect sensitive information and their trans-mission through open communication channels. The principle of implementation of RC4 stream cipher and block AES is described; the essence of the steganographic LSB method, the application of which involves the concealment of information in digital objects, socalled containers. In this paper, the RGB images and WAVE audio files are used as steganocontainers. In the case of a container image, the steganographic protection of the cryptographically enclosed RC4 information algorithm is accomplished by embedding it in the least significant bits of pseudo-randomly selected pixels. The choice of an RGB bitmap is because this type of image consists of a set of pixels of red, green and blue components, which in turn creates enough redundancy and the ability to embed large amounts of information. The embedding of an AES encrypted text message into an audio file is done by block hiding. The simplicity of the WAVE file structure makes it easy to implement any steganographic methods of hiding data without much effort. Software complexes have been developed based on crypto-steganographic systems. The conclusions about the prospects of the crypto-steganographic approach and the feasibility of further research in this direction have been made. The integration of cryptography and steganography makes it possible to get rid of the vulnerabilities of the known methods of information protection and to develop new methods of solving information security problems from the standpoint of computational complexity and resistance to hacking.


Author(s):  
Sonu JHA ◽  
Subhadeep BANIK ◽  
Takanori ISOBE ◽  
Toshihiro OHIGASHI ◽  
Santanu SARKAR

Sign in / Sign up

Export Citation Format

Share Document