Abstract
Cryptography is one of the essential methods for securing the information. In cryptography, there are many encryption algorithms; some of them strong where the others are broken. RC4 stream cipher one of the most common algorithms that are characterized by its speed in implementation does not need large storage space and has less complexity, but there are weaknesses in its output. Numerous researches work on the RC4 stream cipher to boost the security of it, to be strong enough. However, the biases in the output are still in most of the enhancement. The researchers claim that its swap function is responsible for those biases. They recommended to ignore some initial bytes from the key-stream output, to dispose of this before de facto encryption begins. This paper present new development over the RC4 algorithm (RC4D) via amendment in the first and second parts of the algorithm. In the first part, it increases the use of the key operations to obtain more considerable randomness, while adding one more random variable and use the Xor function in the second part. Thus, the experimental result of the NIST statistical tests and the distant-equalities statistical analysis shows the RC4D more robust than the original RC4.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Rueppel, R.A.: Analysis and design of stream ciphers. Springer, New York (2012). https://doi.org/10.1007/978-3-642-82865-2
Lamba, C.S.: Design and analysis of stream cipher for network security. In: Second International Conference on Communication Software and Networks, Singapore, pp. 562-567 (2010). https://doi.org/10.1109/ICCSN.2010.113
Thomas, D.B., Luk, W.: High quality uniform random number generation using LUT optimised state-transition matrices. J. VLSI Signal Process 47, 77–92 (2007). https://doi.org/10.1007/s11265-006-0014-9
Rivest, R.L.: The RC4 encryption algorithm, RSA Data Security Inc., 129-2, March 1992. This document has not been made public
Fluhrer, S., Mantin I., Shamir, A.: Weaknesses in the key scheduling algorithm of RC4. In: Proceedings of Annual Workshop on Selected Areas in Cryptography, Springer, Heidelberg, vol. 2259, pp. 1-24 (2001). https://doi.org/10.1007/3-540-45537-X_1
Xie, J., Pan, X.: An improved RC4 stream cipher. In: International Conference on Computer Application and System Modeling (ICCASM ), IEEE vol. 7, pp.156-159 (2010). https://doi.org/10.1109/ICCASM.2010.5620800
Sinha, N., Chawda, M., Bhamidipati, K.: Enhancing security of improved RC4 stream cipher by converting into product cipher. Int. J. Comput. Appl. (0975 - 8887) vol. 94 - No .18, pp. 17–21, May 2014. https://doi.org/10.5120/16459-6132
Hammood, M.M., Yoshigoe, K., Sagheer, A.M.: RC4 stream cipher with a random initial state. In: Proceedings in Information Technology, Springer, Dordrecht, p. 407 (2013). https://doi.org/10.1007/978-94-007-6996-0_42
Sagheer, M.A., Searan, S.M., Alsharida, R.A.: Modification of RC4 algorithm to increase its security by using mathematical operations, J. Software Eng. Intell. Syst. 1(2), ISSN 2518-8739 (2016). http://www.jseis.org/Volumes/Vol1/V1N2-1.pdf
Zoltak, B.: VMPC One way Function and Stream Cipher, Fast Software Encrypt. FSE, LNCS, 3017, pp. 210–225. Springer, New York (2004)
Paul, S. Preneel, B.: A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Fast Software Encrypt, FSE, LNCS 3017. New York: Springer, Heidelberg, pp. 245–259 (2004). https://doi.org/10.1007/978-3-540-25937-4_16
Maximov, A.: Two linear distinguishing attacks on VMPC and RC4A and weakness of the RC4 family of stream ciphers. In: Fast Software Encryption, FSE, Vol 3557, pp. 342-358, Springer, Cham (2005). https://doi.org/10.1007/11502760_23
Pu, C., Chung, W.C.: Group key update method for improving RC4 stream cipher in wireless sensor networks. In: International Conference on Convergence Information Technology, Gyeongju, pp. 1366-1371 (2007)
Hammood, M.M. Yoshigoe, K., Sagheer, A.M.: RC4-2S: RC4 stream cipher with two state tables. In: Information Technology Convergence, pp. 13–20. Springer, Netherlands (2013). https://doi.org/10.1007/978-94-007-6996-0_2
Yao, Y., Chong, J., Xingwei, W.: Enhancing RC4 algorithm for WLAN WEP protocol. In: Control and Decision Conference (CCDC), pp. 3623–3627, IEEE (2010). https://doi.org/10.1109/CCDC.2010.5498536
Hammood, M.M., Yoshigoe, K., Sagheer, A.M.: Enhancing security and speed of RC4. Int. J. Comput. Network Technol. 3(02) (2015). https://doi.org/10.12785/ijcnt/030201
Das, S., Ghosh, R., Pal, R.K.: An approach of refining RC4 with performance analysis on new variants. Sādhanā 44(11), 223 (2019). https://doi.org/10.1007/s12046-019-1209-7
Zelenoritskaya, A.V., Ivanov, M.A., Salikov, E.A.: Possible modifications of RC4 stream cipher. In: Advanced Technologies in Robotics and Intelligent Systems, pp. 335–341. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-33491-8-40
Mister, S. Tavares, S.E.: Cryptanalysis of RC4-like Ciphers. In: International Workshop on Selected Areas in Cryptography, Springer, Cham (1998). https://doi.org/10.1007/3-540-48892-8_11
Roos, A.: A class of weak keys in the RC4 stream cipher, September 1995. http://agreg.dnsalias.org/Luminy/WeakKeys-report.pdf
Jindal, P., Singh, B.: Performance analysis of modified RC4 encryption algorithm. In: Recent Advances and Innovations in Engineering (ICRAIE), 2014. IEEE (2014). https://doi.org/10.1109/ICRAIE.2014.6909247
Tomašević, V., Bojanić, S., Nieto-Taladriz, O.: Finding an internal state of RC4 stream cipher. Inf. Sci. 177(7), 1715–1727 (2007)
AlFardan, N., Bernstein, D.J., Paterson, K.G., Poettering, B., Schuldt, J.C.: On the security of RC4 in TLS. In: Presented as Part of the 22nd USENIX Security Symposium, pp. 305-320 (2013)
Hammood, M.M., Yoshigoe, K.: Previously overlooked bias signatures for RC4, 4th Inter-national Symposium on Digital Forensic and Security (ISDFS). Little Rock, AR 2016, 101–106 (2016). https://doi.org/10.1109/ISDFS.2016.7473526
Zoltak, B.: Statistical weaknesses in 20 RC4-like algorithms and (probably) the simplest algorithm free from these weaknesses - VMPC-R, IACR Cryptology ePrint Archive, IJCSN, 2014. https://eprint.iacr.org/2014/315.pdf
Zoltak, B.: Statistical weakness in Spritz against VMPC-R: in search for the RC4 replace-ment. IACR Cryptology ePrint Archive, 985, (2014). https://eprint.iacr.org/2014/985.pdf
Rukhin, A., Soto, J., Nechvatal, J., Smid, M., Barker, E., Leigh, S., Levenson, M., Van-gel, M., Banks, D., Heckert, A., Dray, J., Vo, S.: A statistical test suite for random and pseudorandom number generators for cryptographic applications, NIST special publication 800–22. Gaithersburg, National institute of standards and technology (NIST) (2001). https://apps.dtic.mil/dtic/tr/fulltext/u2/a393366.pdf
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2021 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Alsharida, R., Hammood, M., Ahmed, M.A., Thamer, B., Shakir, M. (2021). RC4D: A New Development of RC4 Encryption Algorithm. In: Ghita, B., Shiaeles, S. (eds) Selected Papers from the 12th International Networking Conference. INC 2020. Lecture Notes in Networks and Systems, vol 180. Springer, Cham. https://doi.org/10.1007/978-3-030-64758-2_2
Download citation
DOI: https://doi.org/10.1007/978-3-030-64758-2_2
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-64757-5
Online ISBN: 978-3-030-64758-2
eBook Packages: EngineeringEngineering (R0)