Filters








11 Hits in 5.5 sec

RC4 Encryption-A Literature Survey

Poonam Jindal, Brahmjit Singh
2015 Procedia Computer Science  
A chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in this paper.  ...  Hence our chronological survey corroborates the fact that even though researchers are working on RC4 stream cipher since last two decades, it still offers a plethora of research issues.  ...  In term of speed the proposed cipher performs much better in comparison with HC-128, the fastest software stream cipher amongst the e-STREAM finalists.A new variant of RC4 known as FJ-RC4 is proposed by  ... 
doi:10.1016/j.procs.2015.02.129 fatcat:3eheztbbh5hwtp6al2am74zq34

A Survey on RC4 Stream Cipher

Poonam Jindal, Brahmjit Singh
2015 International Journal of Computer Network and Information Security  
RC4 is one of the most widely used stream cipher due to its simplicity, speed and efficiency.  ...  In this paper we have presented a chronological survey of RC4 stream cipher demonstrating its weaknesses followed by the various RC4 enhancements from the literature.  ...  . • Another area of analysis is the identification of short term and long term biases in the keystream bytes.  ... 
doi:10.5815/ijcnis.2015.07.05 fatcat:qksutfja6behxmg7ycsq3fea3e

(Non-)Random Sequences from (Non-)Random Permutations—Analysis of RC4 Stream Cipher

Sourav Sen Gupta, Subhamoy Maitra, Goutam Paul, Santanu Sarkar
2012 Journal of Cryptology  
We also investigate for long-term non-randomness in the keystream, and prove a new long-term bias of RC4.  ...  RC4 has been the most popular stream cipher in the history of symmetric key cryptography.  ...  We are also grateful to the Centre of Excellence in Cryptology (CoEC), Indian Statistical Institute, Kolkata, funded by the Government of India, for partial support towards this project.  ... 
doi:10.1007/s00145-012-9138-1 fatcat:jc6baa44djbi7ojqsmtxpypr3q

Attack on Broadcast RC4 Revisited [chapter]

Subhamoy Maitra, Goutam Paul, Sourav Sen Gupta
2011 Lecture Notes in Computer Science  
Moreover, these results are always of theoretical significance in terms of studying one of the most popular stream ciphers.  ...  To get rid of these problems, one may throw away some initial bytes of RC4 PRGA as suggested in [3, 7] .  ...  Santanu Sarkar, who have helped improve the technical content of the paper through discussions regarding some of the probability computations.  ... 
doi:10.1007/978-3-642-21702-9_12 fatcat:zyqf62hjpfdpdcb37zjvub6foa

RunFein: a rapid prototyping framework for Feistel and SPN-based block ciphers

Ayesha Khalid, Muhammad Hassan, Goutam Paul, Anupam Chattopadhyay
2016 Journal of Cryptographic Engineering  
For software platforms, throughput of a cipher is specified in terms of cycles/byte (stream ciphers, PRNGs), cycles/hash (hash functions) or cycles/block (block ciphers).  ...  ., RC4 + [11] . 2.  ...  CRYKET (CRYptographic Kernels Toolkit) caters to rapid prototyping of various cryptographic functions while RunFein is an instance of it dealing with block ciphers.  ... 
doi:10.1007/s13389-016-0116-7 fatcat:rwgbiittbnav3m2gqvxlibwgre

Various Approaches towards Cryptanalysis

Shaligram Prajapat, Ramjeevan Singh
2015 International Journal of Computer Applications  
Classification: Useful in detecting cipher-text scanners to decide the nature and class of algorithm.  ...  (refer table 1) Clustering: It groups the cipher-text based on similarity into groups for predicting the algorithm and pattern of the groups.  ...  So, one can have clear glimpses of the work done in cryptanalysis using various techniques and algorithms.  ... 
doi:10.5120/ijca2015906518 fatcat:fb3bvb5ahrd5ldoo6pyoaropyu

Statistical and Algebraic Cryptanalysis of Lightweight and Ultra-Lightweight Symmetric Primitives

Pouyan Sepehrdad
2012
This thesis is composed of two distinct parts: In the first part, we investigate the security of RC4 stream cipher against statistical attacks. We focus on its applications in WEP and WPA protocols.  ...  Abstract Symmetric cryptographic primitives such as block and stream ciphers are the building blocks in many cryptographic protocols.  ...  They also provide a better understanding of the RC4 stream cipher.  ... 
doi:10.5075/epfl-thesis-5415 fatcat:mdmeaqtdgfhhxonivvmyo4llzq

Computer Networking [article]

Kurose Ross
2017 Zenodo  
via laptops, tablets, and smartphones; and with an array of new Internet-connected "things" including game consoles, surveillance systems, watches, eye glasses, thermostats, body scales, and cars.  ...  Today's Internet is arguably the largest engineered system ever created by mankind, with hundreds of millions of connected computers, communication links, and switches; with billions of users who connect  ...  LTE (for "Long-Term Evolution"-a candidate for Bad Acronym of the Year Award) has its roots in 3G technology, and can achieve rates in excess of 10 Mbps.  ... 
doi:10.5281/zenodo.5599466 fatcat:roncomlhjrf7dafpacammhf6xq

Virtual Private Overlays: Secure Group Commounication in NAT-Constrained Environments [article]

David Isaac Wolinsky, Kyungyong Lee, Tae Woong Choi, P. Oscar Boykin,, Renato Figueiredo
2010 arXiv   pre-print
In this paper we propose a novel way of creating overlays that are both secure and private and a method to bootstrap them using a public overlay.  ...  Each group acts as a Public Key Infrastructure (PKI) relying on the use of a centrally-managed web site providing an automated Certificate Authority (CA).  ...  Thus BitTorrent security uses a weak stream cipher, RC4, and lacks peer authentication as symmetric keys are exchanged through an unauthenticated Diffie-Hellman process.  ... 
arXiv:1001.2569v1 fatcat:i3w3mrkaxvd75oqioa4gjqleua

THINC: A Virtual and Remote Display Architecture for Desktop Computing and Mobile Devices

Ricardo A. Baratto
2017
It also introduces a number of novel systems which build upon THINC's architecture to provide new and improved desktop computing services.  ...  THINC is a new virtual and remote display architecture for desktop computing.  ...  RC4 [125] stream cipher algorithm.THINC's virtual and remote display architecture provides a number of crucial benefits to MobiDesk:• First, THINC enables MobiDesk to take full advantage of existing infrastructure  ... 
doi:10.7916/d8377gq7 fatcat:scya2wzon5avtgyg6pagiozuni

The nation's valiant fighters against illiteracy: Locating the cultural politics of 'development' in 1990s Uganda

David Shane Mills
1997
I describe how, in the bitter aftermath of rural neglect and isolation stemming from the 1980s liberation war, monarchical idioms from Buganda's past have been suddenly reinvigorated within new Buganda  ...  This dissertation is a partial account of the cultural politics of 'development' in contemporary Uganda, focusing particularly on educational institutions as sites of negotiation of modernity's gendered  ...  or long-term perspective.  ... 
doi:10.25501/soas.00029437 fatcat:h2wc56egnrf73ffgoavbzrn2ry