RC4 Paper
RC4 Paper
Shenam Chugh
M Tech Scholar
Assistant Professor
Bhiwani, India
Bhiwani, India
Abstract
introducing
the
RC4
algorithm.
The
introductory
known
attacks
on
RC4.
This
paper
proposes
three
exchanging
1.
RC4
is
INTRODUCTION
most widely used stream
cipher
two
states
Initialisation Mode:
Input: n=8,
key length (in bytes) = k;
Key : K[O...(k-l)];
for i=O to 255
S[i]=i ;
j=O;
for i=O to (n-l)
j=j+S[i]+K[i mod k];
swap(S,i,j);
Output Mode:
i=j=O;
Repeat
i=i+l;
j=j+S[i];
swap(S,i,j);
1436
output=S[S[i]+S[j]];
Until done
This
research
is indicate
as
follows. Section I
LITERATURE REVIEW
III.
Algorithm Loopholes
1437
PROPOSED ALGORITHM
B.
C.
1438
inter vector
KSA(keyl, key2)
SI[I ]= 0 to (N/2-1);
S2[I] = (N/2) to (N-I);
j=O;
for i= 0 to (N/2-1)
Session Key
+ IV
(24 bit)
+ IV
(32 bit)
}
}
Session Key
i=j 1=j2=x=0;
loop (i<size(PT
{
i=i+1) mod N/2);
jl=(01+S1(i+l mod N/2);
Swap(SI(i+1 ),S20 1+1;
tl= (SI(SI(i+I)+SI01+I mod N/2)+1);
j2= (G2+S2(i+1 mod N/2);
Swap(S2(i+1),S102+1;
t2= (S2(S2(i+1)+S202+1 mod N/2)+1);
kseq(x+1)=t1;
kseq(X+2)=t2;
follows:
Step I : Write the code for modified RC4 algorithm.
Step 2 : Generate the 32 bit secret key from a 40 bit key
Step 3 : Select Key function sequentially select a sub key
from the given sub-keys set.
11mbps / (1500bytelpacket
2
24
Sbit/byte)
917 packet/sec
IV = mod(randi(256,4),256)
Step 5 : Concatenate key and IV using the concatenation
function to generate a session key.
Step 6 : Pass this session key to our proposed RC4
algorithm.
Step 7 : The key sequence generated from proposed RC4
is XORed with the PT.
Step 8 : The IV is encrypted by XORing it with the
current 32 bit sub-key and then append this IV with the
cipher text.
=16777216
167777216/917=5.1h
1439
RESULT ANALYSIS
V.
TABLE 2
FILE
SIZE
10
20
TABLE I
30
FILE
SIZE
40
10
20
30
40
50
60
70
80
90
100
RC4
RC42
S
14.205
9
20.224
9.8943
26.404
3
28.269
10.861
4
17.077
6
12.278
34.021
3
38.740
3
43.909
6
50.718
6
56.612
5
58.631
4
15.148
7
17.824
9
51.529
4
59.669
5
63.724
5
64.789
5
Effect
ive
RC4
372.54
2
858.19
5
1506
2269.4
3
3260.3
5
4267.6
3
4317.1
6
7715.5
4
7932.4
3
8088.5
5
Impro
ved
RC4
369.24
5
848.37
8
1546.6
7
2289.0
I
3244.5
7
7088.2
5
5534.1
3
6898.7
4
7249.2
4
7734.1
Modif
ied
RC4
475.50
I
1211.5
7
2294.6
1
3604.1
6
3175.6
3
7174.8
9
5490.3
I
11829.
8
12876.
3
17345.
8
Propo
sed
7.0718
8
7.9767
8
8.1009
9
10.822
4
12.822
4
13.993
3
17.327
6
19.920
6
22.171
9
27.485
8
50
60
70
80
90
100
I 10000
1=
+----+
+-----t-++
5000 +-----t--t-It-t-.
o
L&L&L&
1 2 3 4 5 6 7 8 910
Exp
Figl.Encryption Time
1440
No.
-RC4
-RC42S
-EffectiveRC4
20.767
26.015
8
32.512
3
38.235
2
44.594
8
52.822
5
55.723
4
58.673
4
12.471
14.617
16.499
7
49.970
2
57.921
8
59.243
64.865
4
Effccti
ve
RC4
336.57
8
853.70
2
1521.8
7
2250.4
2
3220.5
5
4255.5
3
4208.7
8
7489.5
7942.8
8105.4
2
Impro
ved
RC4
360.33
9
836.13
4
1497.7
5
2272.1
5
3186.9
7
7327.0
5
5509
7001.9
9
7301.2
4
7600.0
5
Modifi
cd
RC4
438.19
4
1204.5
2
2256.1
8
3599.4
2
3166.2
5
7190.2
5
5431.8
6
11903
12805.
05
17835.
2
Propo
sed
6.9055
7
6.7649
3
8.0753
4
10.785
9
12.751
1
13.751
I
17.239
8
19.871
9
23.749
I
28.743
6
Decryption Time
20000 ....-- 15000 +----t
I lOOOO
1=
Encryption Time
RC4
9.9934
2
14.744
3
RC42
S
7.4491
3
8.1553
9
9.6382
4
5000 +-----f.-t-lt-t-...
o
Exp
No.
-RC4
-RC42S
-EffectiveRC4
-ImprovedRC4
-ModifiedRC4
Proposed
Fig2.Decryption Time
CONCLUSION
-ImprovedRC4
-ModifiedRC4
-Proposed
1441