The security of RC4 algorithm using keys generation depending on user's retina
نویسندگان
چکیده
Digital technologies grow more rapidly; information security threats are becoming increasingly dangerous. Advanced and various cyber-attacks threats, like targeted emails, exploitation, pose a critical threat that basically undermines our trust in the digital society. Rivest cipher 4 (RC4) algorithm is significant of stream could be utilized with protocols internet, advantage RC4 it simple effective. There several weak, especially after pseudo-random generation (PRGA), PRGA's initially 256 rounds (the amount permutation). Several modified studies have been published thus far, however, they all face either standard privacy or achievement evaluation issues. This paper proposes new based on user's retina (RC4-Retina), which has solved both these weak points was indicated algorithm. The novelty key scheduling (RKSA), generated by relying will modify matrix permutation used to configure keys. efficiency improved measured depending average ciphertext different keys messages, results were good compared
منابع مشابه
Generalized Classes of Weak Keys on RC4 Using Predictive State
Conventional class of weak keys on RC4 stream cipher is defined as a specific case that combinations of the first three bytes of secret key satisfy two relational equations. This paper expands and generalizes the classes of weak keys using generalized relational equations and special classes of the internal state (called predictive state). We derive the probability that generalized classes of w...
متن کاملthe impact of using inspirational quotes on abstract vocabulary recall
the present study is an attempt to investigate the potential impact of inspirational quotes on improving english abstract vocabulary recall. to achieve this goal, a multiple choice language proficiency test of 60 items including vocabulary and grammar component was administered to a sample of 63 second-semester male and female students whose age ranged between 17 to 22 and they were studying en...
15 صفحه اولthe effect of using model essays on the develpment of writing proficiency of iranina pre-intermediate efl learners
abstract the present study was conducted to investigate the effect of using model essays on the development of writing proficiency of iranian pre-intermediate efl learners. to fulfill the purpose of the study, 55 pre- intermediate learners of parsa language institute were chosen by means of administering proficiency test. based on the results of the pretest, two matched groups, one as the expe...
the effect of using visual aids on the development of speech act of disagreement among iranian intermediate efl learners
abstract the present study tried to investigate the effect of visual aids (films) on the development of the speech act of disagreement among iranian efl intermediate learners. to this end, the researcher selected 40 homogeneous intermediate learners based on their scores on oxford placement test. .the subjects then divided into control group and experimental group. both classes were tested by ...
On the Security of RC4 in TLS
The Transport Layer Security (TLS) protocol aims to provide confidentiality and integrity of data in transit across untrusted networks. TLS has become the de facto protocol standard for secured Internet and mobile applications. TLS supports several symmetric encryption options, including a scheme based on the RC4 stream cipher. In this paper, we present ciphertext-only plaintext recovery attack...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Indonesian Journal of Electrical Engineering and Computer Science
سال: 2021
ISSN: ['2502-4752', '2502-4760']
DOI: https://doi.org/10.11591/ijeecs.v24.i1.pp452-463