CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

Comparative study between stream cipher and block cipher using RC4 and Hill Cipher

by Shish Ahmad, Mohd. Rizwan Beg, Qamar Abbas, Jameel Ahmad, Mohd Atif
journal cover thumbnail
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 1 - Number 25
Year of Publication: 2010
Authors: Shish Ahmad, Mohd. Rizwan Beg, Qamar Abbas, Jameel Ahmad, Mohd Atif
10.5120/465-770

Shish Ahmad, Mohd. Rizwan Beg, Qamar Abbas, Jameel Ahmad, Mohd Atif . Comparative study between stream cipher and block cipher using RC4 and Hill Cipher. International Journal of Computer Applications. 1, 25 ( February 2010), 9-12. DOI=10.5120/465-770

@article{ 10.5120/465-770,
author = { Shish Ahmad, Mohd. Rizwan Beg, Qamar Abbas, Jameel Ahmad, Mohd Atif },
title = { Comparative study between stream cipher and block cipher using RC4 and Hill Cipher },
journal = { International Journal of Computer Applications },
issue_date = { February 2010 },
volume = { 1 },
number = { 25 },
month = { February },
year = { 2010 },
issn = { 0975-8887 },
pages = { 9-12 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume1/number25/465-770/ },
doi = { 10.5120/465-770 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T19:48:28.992957+05:30
%A Shish Ahmad
%A Mohd. Rizwan Beg
%A Qamar Abbas
%A Jameel Ahmad
%A Mohd Atif
%T Comparative study between stream cipher and block cipher using RC4 and Hill Cipher
%J International Journal of Computer Applications
%@ 0975-8887
%V 1
%N 25
%P 9-12
%D 2010
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Sometimes the information, which is transferred during the communication, is very much confidential which is needed to be secure. For securing the information various encryption algorithms like DES, BLOWFISH, RC4 etc., are used. Our aim in this paper is to find the two keys using cryptanalysis method, that is used for encrypting the information transferred during communication by using the Meet in the Middle Attack on triple S-DES algorithm, instead of using Brute force attack.

References
  1. P. Ekdahl, T. Johansson. A new version ot the stream cipher SNOW, available from http://www.it.lth.se/cryptology/snow/, 2002.
  2. [STIN02] Stinson, D. Cryptography: Theory and Practice. Boca Raton,FL: Press,2002
  3. [RES01] Rescorla, E. SSL and TLS: Designing and Building Secure system, Reading , MA : addition-Welsey, 2001.
  4. [ROBS95a] Robshaw, M. Stream Cipher. RSA Laboratories Technical Report TR- 701 July 1995. http// www.rsasecurity.com/rsalabs/Index.html.
  5. [ROBS95b] Robshaw, M. Stream Cipher. RSA Laboratories Technical Report TR- 601 July 1995. http// www.rsasecurity.com/rsalabs/Index.html.
  6. [KNUD98] Knudsen. L., et al. "Analysis method for alledged RC4." Proceedings, ASIACRYPT '98, 1998.
  7. [MIST98] Mister, S.; and Tavares, S. "Cryptography of RC4 like Cipher." Proceeding, workshop in selected areas of cryptography, SAC 1998.
  8. [FLUH00] Fluhrer, S. and McGrew, D. "Statistical analysis of the alleged RC4 key stream Generator. " Proceeding, Fast software encryption 2000.
  9. [FLUH01] Fluhrer, S. Mantin, I. and Shamir, A. Weakness in the key scheduling algorithm of RC4. "." Proceeding, workshop in selected areas of cryptography, SAC2001.
  10. [MANT01] Mantin, I., Shamir, A. "A practical attack on broadcast RC4." Proceeding, Fast software encryption 2001.
  11. [RUPE92] Rueppel, T. "Stream ciphers" IN [SIMM92].
  12. [SIMM92] Simmons, G., ed., Contemporary cryptology: The science of information Integrity, Piscataway, NJ: IEEE Press 1992.
  13. M. D. Galanis, P. Kitsos, G. Kostopoulos, O. Koufopavlou, Comparison of the Performanceof Stream Ciphers for Wireless Communications, proceedings of CCCT'04, Austin, Texas, USA,August 14-17, 2004.
  14. L. Batina, J. Lano, N. Mentens, B. Preneel, I. Verbauwhede, S. B. Ä Ors, Energy, Performance,Area versus Security Trade-o®s for Stream Ciphers, in ECRYPT Workshop, SASC - The State of the Art of Stream Ciphers, pp. 302-310, 2004.
  15. Nicolas T. Courtois1, Karsten Nohl2, and Sean O'Neil3 1 University College London, UK 2 University of Virginia, USA 3 VEST Corporation, France "Algebraic Attacks on the Crypto-1 Stream Cipher in MiFare Classic and Oyster Cards" March 2008.
Index Terms

Computer Science
Information Sciences

Keywords

RC4 Stream Cipher Block Cipher Encryption and Decryption