CFP last date
20 May 2024
Call for Paper
June Edition
IJCA solicits high quality original research papers for the upcoming June edition of the journal. The last date of research paper submission is 20 May 2024

Submit your paper
Know more
Reseach Article

A High Throughput Algorithm for Data Encryption

by A.Rathika, Parvathy Nair, M.Ramya
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Number 5
Year of Publication: 2011
Authors: A.Rathika, Parvathy Nair, M.Ramya
10.5120/1777-2450

A.Rathika, Parvathy Nair, M.Ramya . A High Throughput Algorithm for Data Encryption. International Journal of Computer Applications. 13, 5 ( January 2011), 13-16. DOI=10.5120/1777-2450

@article{ 10.5120/1777-2450,
author = { A.Rathika, Parvathy Nair, M.Ramya },
title = { A High Throughput Algorithm for Data Encryption },
journal = { International Journal of Computer Applications },
issue_date = { January 2011 },
volume = { 13 },
number = { 5 },
month = { January },
year = { 2011 },
issn = { 0975-8887 },
pages = { 13-16 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume13/number5/1777-2450/ },
doi = { 10.5120/1777-2450 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:01:55.669654+05:30
%A A.Rathika
%A Parvathy Nair
%A M.Ramya
%T A High Throughput Algorithm for Data Encryption
%J International Journal of Computer Applications
%@ 0975-8887
%V 13
%N 5
%P 13-16
%D 2011
%I Foundation of Computer Science (FCS), NY, USA
Abstract

RC4 encryption algorithm [3,12,16] was examined based on the text to be encrypted and the chosen key. It is a symmetric key algorithm and uses stream cipher i.e. data is being encrypted bit by bit. The same algorithm is used for both encryption and decryption. The data stream is XORed with the generated key sequence and the key stream is completely independent of the plaintext used. The weakness of the algorithm has been found out and is being rectified. We proposed a modification in RC4 algorithm that would result in saving the memory space and also augment the performance by reducing the time. The proposed algorithm explains that we can have the key as an image so that we can compress it and store. Hence the algorithm yields better results in hardware also.

References
  1. Allam Mousa and Ahmad Hamad ,“Evaluation of the RC4 Algorithm for Data Encryption”, International Journal of Computer Science and Applications, Vol 3,No. 2, June 2006
  2. Bruce Schneier “Applied Cryptography-Protocols, Algorithms and Source code in C”.
  3. Diffie.W and Hellman.M, “New Directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, 1976
  4. Ed Dawson, Helen Gustafson, Matt Henricksen, Bill Millan “Evaluation of RC4 Stream Cipher” Information Security Research Centre ,Queensland University of Technology
  5. Eli Biham and Yaniv Carmeli, “Efficient Reconstruction of RC4 Keys from Internal States”, International Association for Cryptologic Research, 2008
  6. Erica Simcoe, Hirsh Goldberg, and Mehmet Ucal, Advisor: Dr. Sennur Ulukus, “An Examination of Security Algorithm Flaws in Wireless Networks”
  7. Guang Gong, Kishan Chand Gupta, Martin Hell and Yassir Nawaz, “Towards a General RC4-like Keystream Generator”
  8. Guy E. Blelloch, “Introduction to Data Compression”, Computer Science Department Carnegie Mellon University, September 25, 2010.
  9. Menezes. A, Van.P, Oorschot, and Vanstone.S, ”Handbook of Applied Cryptography”, CRC Press, 1996
  10. Nadeem.A, “A performance comparison of data encryption algorithms," IEEE Information and Communication Technologies, 2006
  11. Nathaniel Couture Kenneth B. Kent, “The Effectiveness of Brute Force Attacks on RC4”
  12. PachghareV.K , Eastern Economy Edition, Cryptography and Information Security
  13. “RC4 Encryption Algorithm” http://www.vocal.com
  14. Rick Wash, “Lecture Notes on Stream Cipher and RC4”
  15. Scott Fluhrer, Itsik Mantin, and Adi Shamir, ”Weaknesses in the key scheduling algorithm of RC4”
  16. Stallings.W, Cryptography and Network Security, Prentice Hall, 4th Ed, 2005.
Index Terms

Computer Science
Information Sciences

Keywords

RC4 (Rivest Cipher 4) algorithm Symmetric Key Assymetric Key