Professional Documents
Culture Documents
Shenam Chugh
M Tech Scholar
Assistant Professor
Bhiwani, India
Bhiwani, India
dkamal@brcm.edu.in
shenam91@gmail.com
Abstract
introducing
the
RC4
algorithm.
The
introductory
known
attacks
on
RC4.
This
paper
proposes
three
exchanging
1.
RC4
is
INTRODUCTION
most widely used stream
cipher
two
states
Initialisation Mode:
Input: n=8,
key length (in bytes) = k;
Key : K[O...(k-l)];
for i=O to 255
S[i]=i ;
j=O;
for i=O to (n-l)
j=j+S[i]+K[i mod k];
swap(S,i,j);
Output Mode:
i=j=O;
Repeat
i=i+l;
j=j+S[i];
swap(S,i,j);
1436
output=S[S[i]+S[j]];
Until done
This
research
is indicate
as
follows. Section I
LITERATURE REVIEW
III.
Algorithm Loopholes
1437
PROPOSED ALGORITHM
B.
C.
1438
inter vector
KSA(keyl, key2)
SI[I ]= 0 to (N/2-1);
S2[I] = (N/2) to (N-I);
j=O;
for i= 0 to (N/2-1)
Session Key
+ IV
(24 bit)
+ IV
(32 bit)
}
}
Session Key
i=j 1=j2=x=0;
loop (i<size(PT
{
i=i+1) mod N/2);
jl=(01+S1(i+l mod N/2);
Swap(SI(i+1 ),S20 1+1;
tl= (SI(SI(i+I)+SI01+I mod N/2)+1);
j2= (G2+S2(i+1 mod N/2);
Swap(S2(i+1),S102+1;
t2= (S2(S2(i+1)+S202+1 mod N/2)+1);
kseq(x+1)=t1;
kseq(X+2)=t2;
follows:
Step I : Write the code for modified RC4 algorithm.
Step 2 : Generate the 32 bit secret key from a 40 bit key
Step 3 : Select Key function sequentially select a sub key
from the given sub-keys set.
11mbps / (1500bytelpacket
2
24
Sbit/byte)
917 packet/sec
IV = mod(randi(256,4),256)
Step 5 : Concatenate key and IV using the concatenation
function to generate a session key.
Step 6 : Pass this session key to our proposed RC4
algorithm.
Step 7 : The key sequence generated from proposed RC4
is XORed with the PT.
Step 8 : The IV is encrypted by XORing it with the
current 32 bit sub-key and then append this IV with the
cipher text.
=16777216
167777216/917=5.1h
1439
RESULT ANALYSIS
V.
TABLE 2
FILE
SIZE
10
20
TABLE I
30
FILE
SIZE
40
10
20
30
40
50
60
70
80
90
100
RC4
RC42
S
14.205
9
20.224
9.8943
26.404
3
28.269
10.861
4
17.077
6
12.278
34.021
3
38.740
3
43.909
6
50.718
6
56.612
5
58.631
4
15.148
7
17.824
9
51.529
4
59.669
5
63.724
5
64.789
5
Effect
ive
RC4
372.54
2
858.19
5
1506
2269.4
3
3260.3
5
4267.6
3
4317.1
6
7715.5
4
7932.4
3
8088.5
5
Impro
ved
RC4
369.24
5
848.37
8
1546.6
7
2289.0
I
3244.5
7
7088.2
5
5534.1
3
6898.7
4
7249.2
4
7734.1
Modif
ied
RC4
475.50
I
1211.5
7
2294.6
1
3604.1
6
3175.6
3
7174.8
9
5490.3
I
11829.
8
12876.
3
17345.
8
Propo
sed
7.0718
8
7.9767
8
8.1009
9
10.822
4
12.822
4
13.993
3
17.327
6
19.920
6
22.171
9
27.485
8
50
60
70
80
90
100
I 10000
1=
+----+
+-----t-++
5000 +-----t--t-It-t-.
o
L&L&L&
1 2 3 4 5 6 7 8 910
Exp
Figl.Encryption Time
1440
No.
-RC4
-RC42S
-EffectiveRC4
20.767
26.015
8
32.512
3
38.235
2
44.594
8
52.822
5
55.723
4
58.673
4
12.471
14.617
16.499
7
49.970
2
57.921
8
59.243
64.865
4
Effccti
ve
RC4
336.57
8
853.70
2
1521.8
7
2250.4
2
3220.5
5
4255.5
3
4208.7
8
7489.5
7942.8
8105.4
2
Impro
ved
RC4
360.33
9
836.13
4
1497.7
5
2272.1
5
3186.9
7
7327.0
5
5509
7001.9
9
7301.2
4
7600.0
5
Modifi
cd
RC4
438.19
4
1204.5
2
2256.1
8
3599.4
2
3166.2
5
7190.2
5
5431.8
6
11903
12805.
05
17835.
2
Propo
sed
6.9055
7
6.7649
3
8.0753
4
10.785
9
12.751
1
13.751
I
17.239
8
19.871
9
23.749
I
28.743
6
Decryption Time
20000 ....-- 15000 +----t
I lOOOO
1=
Encryption Time
RC4
9.9934
2
14.744
3
RC42
S
7.4491
3
8.1553
9
9.6382
4
5000 +-----f.-t-lt-t-...
o
Exp
No.
-RC4
-RC42S
-EffectiveRC4
-ImprovedRC4
-ModifiedRC4
Proposed
Fig2.Decryption Time
CONCLUSION
-ImprovedRC4
-ModifiedRC4
-Proposed
1441