State of the Art Realistic Cryptographic Approaches for RC4 Symmetric Stream Cipher
نویسندگان
چکیده
In many of today’s computer application needs, faster operation is essential to the efficient implementation of information security algorithm. RC4 has been used as the data encryption algorithm for many applications and protocols including the Wi-Fi, Skype, and Bit Torrent to name a few. Several efficient approaches to the implementation of RC4 have been proposed and we review some of those. More recently some parallel approaches to faster implementation of RC4 have been presented and we include those in our survey of efficient approaches to RC4. This paper presents an analysis of available hardware/software parallel implementations of RC4 symmetric key-based algorithm and some security approaches which make it more secure.
منابع مشابه
Hardware Accelerator for Stream Cipher Spritz
RC4, the dominant stream cipher in e-commerce and communication protocols such as, WEP, TLS, is being considered for replacement due to the series of vulnerabilities that have been pointed out in recent past. After a thorough analysis of the possible weaknesses, Spritz, a new stream cipher is proposed to that effect by the author of RC4. The design of Spritz is based on Cryptographic Sponge con...
متن کاملComparative Analysis of AES and RC4 Algorithms for Better Utilization
-In the today world, security is required to transmit confidential information over the network. Security is also demanding in wide range of applications. Cryptographic algorithms play a vital role in providing the data security against malicious attacks. But on the other hand, they consume significant amount of computing resources like CPU time, memory, encryption time etc. Normally, symmetric...
متن کاملAn Exquisite Cryptographic Algorithm for Lesser Amount of Data
Once an application steps out of the bounds of a single-computer box, its external communication is immediately exposed to a multitude of outside observers with various intentions, good or bad. In order to protect sensitive data while these are en route, applications invoke different methods. In today's world, most of the means of secure data and code storage and distribution rely on using cryp...
متن کاملStatistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives
Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols. Having such blocks which provide provable security against various types of attacks is often hard. On the other hand, if possible, such designs are often too costly to be implemented and are usually ignored by practitioners. Moreover, in RFID protocols or sensor networks,...
متن کاملComparison Based Analysis of Different Cryptographic and Encryption Techniques Using Message Authentication Code (MAC) in Wireless Sensor Networks (WSN)
Wireless Sensor Networks (WSN) are becoming popular day by day, however one of the main issue in WSN is its limited resources. We have to look to the resources to create Message Authentication Code (MAC) keeping in mind the feasibility of technique used for the sensor network at hand. This research work investigates different cryptographic techniques such as symmetric key cryptography and asymm...
متن کامل