CFP last date
20 May 2024
Reseach Article

Analysis of a Modified RC4 Algorithm

by T. D. B. Weerasinghe
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 51 - Number 22
Year of Publication: 2012
Authors: T. D. B. Weerasinghe
10.5120/8341-1617

T. D. B. Weerasinghe . Analysis of a Modified RC4 Algorithm. International Journal of Computer Applications. 51, 22 ( August 2012), 12-16. DOI=10.5120/8341-1617

@article{ 10.5120/8341-1617,
author = { T. D. B. Weerasinghe },
title = { Analysis of a Modified RC4 Algorithm },
journal = { International Journal of Computer Applications },
issue_date = { August 2012 },
volume = { 51 },
number = { 22 },
month = { August },
year = { 2012 },
issn = { 0975-8887 },
pages = { 12-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume51/number22/8341-1617/ },
doi = { 10.5120/8341-1617 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:51:00.312017+05:30
%A T. D. B. Weerasinghe
%T Analysis of a Modified RC4 Algorithm
%J International Journal of Computer Applications
%@ 0975-8887
%V 51
%N 22
%P 12-16
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

In this paper, analysis of a simply modified RC4 algorithm is presented. RC4 is the most widely used stream cipher and it is not considered as a cipher that is strong in security. Many alternatives have been proposed to improve RC4 key generation and pseudo random number generation but the thoughts behind this work is to try out a simple modification of RC4's PRGA, where we can mention like this:

References
  1. Yassir Nawaz and Kishan Chand Gupta and Guang Gong. 2005. A 32-bit RC4-like Keystream Generator. In Cryptology ePrint Archive: Report 2005/175.
  2. T. D. B Weerasinghe. 2012. Analysis of a Hybrid Cipher Algorithm for Data Encryption. In IFRSA's International Journal of Computing, VOL. 2 No. 2, 397-401
  3. T. D. B Weerasinghe. 2012. Secrecy and Performance Analysis of Symmetric Key Encryption Algorithms. In IAES International Journal of Information and Network Security, VOL. 1 No. 2, 77-87
  4. Allam Mousa and Ahmad Hamad. 2006. Evaluation of the RC4 Algorithm for Data Encryption. In International Journal of Computer Science and Applications, VOL. 3, No. 2, 44-56
  5. Lecture notes of Dr. Issa Traore of the University of Victoria, British Columbia, Canada, related to secrecy of ciphers. URL: www. ece. uvic. ca/~itraore/elec567-04/notes/elec6704-6-2. pdf
  6. http://web17. webbpro. de/index. php?page=entropy
Index Terms

Computer Science
Information Sciences

Keywords

Secrecy of RC4 Modified RC4