Advertisement

RC4 Stream Cipher with a Random Initial State

  • Maytham M. Hammood
  • Kenji Yoshigoe
  • Ali M. Sagheer
Conference paper
Part of the Lecture Notes in Electrical Engineering book series (LNEE, volume 253)

Abstract

Rivest Cipher 4 (RC4) is one of the modern encryption techniques utilized in many real time security applications; however, it has several weaknesses including a correlation problem in the initially generated key sequences. In this paper, we propose RC4 stream cipher with a random initial state (RRC4) to solve the RC4’s correlation problem between the public known outputs of the internal state. RRC4 solves the weak keys problem of the RC4 using random initialization of internal state S. Experimental results show that the output streams generated by RRC4 are more random than that generated by RC4. Moreover, RRC4’s high resistivity protects against many attacks vulnerable to RC4 and solves several weaknesses of RC4 such as predictable first bytes of intermediate outputs by RC4.

Keywords

Stream cipher Random number generator RC4 

Notes

Acknowledgments

This work is based in part, upon research supported by the National Science Foundation (under Grant Nos. CNS-0855248 and EPS-0918970). Any opinions, findings and conclusions or recommendations expressed in this material are those of the author(s) and do not necessarily reflect the views of the funding agencies or those of the employers.

References

  1. 1.
    Wu Y, Ma D, Li T, Deng RH (2004) Classify encrypted data in wireless sensor networks. In: Proceedings of the vehicular technology conference, 2004. VTC2004-fall. 2004 IEEE 60th, vol.5, pp 3236–3239. Vol. 5, 26–29 Sept 2004Google Scholar
  2. 2.
    Turan MS, Doganaksoy A, Calik, C (2006) Statistical analysis of synchronous stream ciphers. In: Proceedings of the SASC 2006: Stream ciphers revisitedGoogle Scholar
  3. 3.
    Ahmad S, Beg MR, Abbas Q, Ahmad J, Atif S (2010) Comparative study between stream cipher and block cipher using RC4 and hill cipher. In: Proceedings of the international journal of computer applications (0975–8887), vol 1(25)Google Scholar
  4. 4.
    Menezes AJ, Oorschot PC, Vanstone SA (2001) Handbook of applied cryptography. CRC Press, Boston, 2001Google Scholar
  5. 5.
    Gupta SS, Chattopadhyay A, Sinha K, Maitra S, Sinha B (2013) High-performance hardware implementation for RC4 stream cipher. IEEE Trans Comput 62(4):730–743Google Scholar
  6. 6.
    Sharif SO, Mansoor SP (2010) Performance analysis of stream and block cipher algorithms. In: Proceedings of the 3rd international conference on advanced computer theory and engineering (ICACTE), vol 1. IEEE, pp 522–525Google Scholar
  7. 7.
    Zoltak B (2004) VMPC one-way function and stream cipher. In: Fast software encryption, FSE 2004. LNCS 3017. Springer-Verlag, New York, pp 210–225Google Scholar
  8. 8.
    Maximov A (2005) Two linear distinguishing attacks on VMPC and RC4A and weakness of the RC4 family of stream ciphers. In: Fast software encryption, FSE 2005, vol 3557, Springer, pp 342–358Google Scholar
  9. 9.
    Paul S, Preneel B (2004) A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher. In: Fast software encryption, FSE 2004. LNCS 3017. Springer-Verlag, New York, pp 245–259Google Scholar
  10. 10.
    Kamble BH, Meshram BB (2012) Robustness of RC4 against differential attack. Inter J Adv Res Comput Eng Technol 1(4), ISSN: 2278–1323 Google Scholar
  11. 11.
    Mironov I (2002) (Not So) Random shuffles of RC4. In: Moti Y (ed) Advances in cryptology. Proceedings of the CRYPTO 2002, 22nd annual international cryptology conference. Lecture notes in computer science, vol 2442. Springer, pp 304–319Google Scholar
  12. 12.
    Chefranov AG, Mazurova TA (2006) Pseudo-random number generator RC4 period improvement. In: 2006 IEEE international conference on automation, quality and testing, robotics, vol 2, 25–28 May 2006, pp 38–41Google Scholar
  13. 13.
    Fluhrer S, Mantin I, Shamir A (2001) Weaknesses in the key scheduling algorithm of RC4. In: Proceedings of annual workshop on selected areas in cryptography, vol 2259, Springer, Toronto, pp 1–24Google Scholar
  14. 14.
    Pardeep, Pateriya, P (2012) PC-RC4 algorithm: an enhancement over standard RC4 algorithm. Inter J Comput Sci Net 1(3) Google Scholar
  15. 15.
    Mousa A, Hamad A (2006) Evaluation of the RC4 algorithm for data encryption. Inter J Comput Sci Appl 3(2) Google Scholar
  16. 16.
    Hammood MM, Yoshigoe K, Sagheer AM (2013) RC4-2S: RC4 stream ciphers with two state tables. In: Proceedings in the 5th FTRA international conference on information technology convergence and services (ITCS’13). Lecture notes in electrical engineering, SpringerGoogle Scholar
  17. 17.
    Roos A (1995) A class of weak keys in the RC4 stream cipher. In: Vironix Soft-ware Laboratories, Westville, South AfricaGoogle Scholar
  18. 18.
    Rukhin A, Soto J, Nechvatal J, Smid M, Barker E, Leigh S, Levenson M, Vangel M, Banks D, Heckert A, Dray J, Vo S (2001) A statistical test suite for random and pseudorandom number generators for cryptographic applications. NIST special publication 800-22, National Institute of Standards and Technology (NIST), Gaithersburg. See http://csrc.nist.gov/rng/
  19. 19.
    Stallings W (2011) Cryptography and network security principles and practices, 5th edn. Prentice Hall, PearsonGoogle Scholar

Copyright information

© Springer Science+Business Media Dordrecht 2013

Authors and Affiliations

  • Maytham M. Hammood
    • 1
  • Kenji Yoshigoe
    • 2
  • Ali M. Sagheer
    • 3
  1. 1.Applied ScienceUniversity of ArkansasLittle RockUSA
  2. 2.Computer ScienceUniversity of ArkansasLittle RockUSA
  3. 3.College of ComputerUniversity of AnbarAnbarIraq

Personalised recommendations