Skip to main content

RC4D: A New Development of RC4 Encryption Algorithm

  • Conference paper
  • First Online:
Selected Papers from the 12th International Networking Conference (INC 2020)

Abstract

Cryptography is one of the essential methods for securing the information. In cryptography, there are many encryption algorithms; some of them strong where the others are broken. RC4 stream cipher one of the most common algorithms that are characterized by its speed in implementation does not need large storage space and has less complexity, but there are weaknesses in its output. Numerous researches work on the RC4 stream cipher to boost the security of it, to be strong enough. However, the biases in the output are still in most of the enhancement. The researchers claim that its swap function is responsible for those biases. They recommended to ignore some initial bytes from the key-stream output, to dispose of this before de facto encryption begins. This paper present new development over the RC4 algorithm (RC4D) via amendment in the first and second parts of the algorithm. In the first part, it increases the use of the key operations to obtain more considerable randomness, while adding one more random variable and use the Xor function in the second part. Thus, the experimental result of the NIST statistical tests and the distant-equalities statistical analysis shows the RC4D more robust than the original RC4.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Rueppel, R.A.: Analysis and design of stream ciphers. Springer, New York (2012). https://doi.org/10.1007/978-3-642-82865-2

  2. Lamba, C.S.: Design and analysis of stream cipher for network security. In: Second International Conference on Communication Software and Networks, Singapore, pp. 562-567 (2010). https://doi.org/10.1109/ICCSN.2010.113

  3. Thomas, D.B., Luk, W.: High quality uniform random number generation using LUT optimised state-transition matrices. J. VLSI Signal Process 47, 77–92 (2007). https://doi.org/10.1007/s11265-006-0014-9

    Article  Google Scholar 

  4. Rivest, R.L.: The RC4 encryption algorithm, RSA Data Security Inc., 129-2, March 1992. This document has not been made public

    Google Scholar 

  5. Fluhrer, S., Mantin I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Proceedings of Annual Workshop on Selected Areas in Cryptography, Springer, Heidelberg, vol. 2259, pp. 1-24 (2001). https://doi.org/10.1007/3-540-45537-X_1

  6. Xie, J., Pan, X.: An improved RC4 stream cipher. In: International Conference on Computer Application and System Modeling (ICCASM ), IEEE vol. 7, pp.156-159 (2010). https://doi.org/10.1109/ICCASM.2010.5620800

  7. Sinha, N., Chawda, M., Bhamidipati, K.: Enhancing security of improved RC4 stream cipher by converting into product cipher. Int. J. Comput. Appl. (0975 - 8887) vol. 94 - No .18, pp. 17–21, May 2014. https://doi.org/10.5120/16459-6132

  8. Hammood, M.M., Yoshigoe, K., Sagheer, A.M.: RC4 stream cipher with a random initial state. In: Proceedings in Information Technology, Springer, Dordrecht, p. 407 (2013). https://doi.org/10.1007/978-94-007-6996-0_42

  9. Sagheer, M.A., Searan, S.M., Alsharida, R.A.: Modification of RC4 algorithm to increase its security by using mathematical operations, J. Software Eng. Intell. Syst. 1(2), ISSN 2518-8739 (2016). http://www.jseis.org/Volumes/Vol1/V1N2-1.pdf

  10. Zoltak, B.: VMPC One way Function and Stream Cipher, Fast Software Encrypt. FSE, LNCS, 3017, pp. 210–225. Springer, New York (2004)

    Google Scholar 

  11. Paul, S. Preneel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Fast Software Encrypt, FSE, LNCS 3017. New York: Springer, Heidelberg, pp. 245–259 (2004). https://doi.org/10.1007/978-3-540-25937-4_16

  12. Maximov, A.: Two linear distinguishing attacks on VMPC and RC4A and weakness of the RC4 family of stream ciphers. In: Fast Software Encryption, FSE, Vol 3557, pp. 342-358, Springer, Cham (2005). https://doi.org/10.1007/11502760_23

  13. Pu, C., Chung, W.C.: Group key update method for improving RC4 stream cipher in wireless sensor networks. In: International Conference on Convergence Information Technology, Gyeongju, pp. 1366-1371 (2007)

    Google Scholar 

  14. Hammood, M.M. Yoshigoe, K., Sagheer, A.M.: RC4-2S: RC4 stream cipher with two state tables. In: Information Technology Convergence, pp. 13–20. Springer, Netherlands (2013). https://doi.org/10.1007/978-94-007-6996-0_2

  15. Yao, Y., Chong, J., Xingwei, W.: Enhancing RC4 algorithm for WLAN WEP protocol. In: Control and Decision Conference (CCDC), pp. 3623–3627, IEEE (2010). https://doi.org/10.1109/CCDC.2010.5498536

  16. Hammood, M.M., Yoshigoe, K., Sagheer, A.M.: Enhancing security and speed of RC4. Int. J. Comput. Network Technol. 3(02) (2015). https://doi.org/10.12785/ijcnt/030201

  17. Das, S., Ghosh, R., Pal, R.K.: An approach of refining RC4 with performance analysis on new variants. Sādhanā 44(11), 223 (2019). https://doi.org/10.1007/s12046-019-1209-7

    Article  MathSciNet  Google Scholar 

  18. Zelenoritskaya, A.V., Ivanov, M.A., Salikov, E.A.: Possible modifications of RC4 stream cipher. In: Advanced Technologies in Robotics and Intelligent Systems, pp. 335–341. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-33491-8-40

  19. Mister, S. Tavares, S.E.: Cryptanalysis of RC4-like Ciphers. In: International Workshop on Selected Areas in Cryptography, Springer, Cham (1998). https://doi.org/10.1007/3-540-48892-8_11

  20. Roos, A.: A class of weak keys in the RC4 stream cipher, September 1995. http://agreg.dnsalias.org/Luminy/WeakKeys-report.pdf

  21. Jindal, P., Singh, B.: Performance analysis of modified RC4 encryption algorithm. In: Recent Advances and Innovations in Engineering (ICRAIE), 2014. IEEE (2014). https://doi.org/10.1109/ICRAIE.2014.6909247

  22. Tomašević, V., Bojanić, S., Nieto-Taladriz, O.: Finding an internal state of RC4 stream cipher. Inf. Sci. 177(7), 1715–1727 (2007)

    Article  MathSciNet  Google Scholar 

  23. AlFardan, N., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.: On the security of RC4 in TLS. In: Presented as Part of the 22nd USENIX Security Symposium, pp. 305-320 (2013)

    Google Scholar 

  24. Hammood, M.M., Yoshigoe, K.: Previously overlooked bias signatures for RC4, 4th Inter-national Symposium on Digital Forensic and Security (ISDFS). Little Rock, AR 2016, 101–106 (2016). https://doi.org/10.1109/ISDFS.2016.7473526

    Article  Google Scholar 

  25. Zoltak, B.: Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R, IACR Cryptology ePrint Archive, IJCSN, 2014. https://eprint.iacr.org/2014/315.pdf

  26. Zoltak, B.: Statistical weakness in Spritz against VMPC-R: in search for the RC4 replace-ment. IACR Cryptology ePrint Archive, 985, (2014). https://eprint.iacr.org/2014/985.pdf

  27. Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Van-gel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST special publication 800–22. Gaithersburg, National institute of standards and technology (NIST) (2001). https://apps.dtic.mil/dtic/tr/fulltext/u2/a393366.pdf

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Maytham Hammood .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Alsharida, R., Hammood, M., Ahmed, M.A., Thamer, B., Shakir, M. (2021). RC4D: A New Development of RC4 Encryption Algorithm. In: Ghita, B., Shiaeles, S. (eds) Selected Papers from the 12th International Networking Conference. INC 2020. Lecture Notes in Networks and Systems, vol 180. Springer, Cham. https://doi.org/10.1007/978-3-030-64758-2_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-030-64758-2_2

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-030-64757-5

  • Online ISBN: 978-3-030-64758-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics