Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Strengths and weaknesses of rc4

22/12/2021 Client: muhammad11 Deadline: 2 Day

1A Review of Literature Concerning RC4andAn Improved Cryptosystem Based Upon RC4Michael LeeComputer Science Dept., University of California at Santa Barbarakirbysdl@cs.ucsb.eduAbstract. This paper discusses important features and issues surrounding the RC4 encryption algorithm. I begin by introducing the study of stream ciphers as an important field of cryptography. I then proceed to examine the RC4 algorithm itself as well as a popular implementation of the algorithm known as Ciphersaber. In particular, I review and analyze security concerns of both RC4 and Ciphersaber. I conclude after proposing and briefly discussing a modified Ciphersaber cryptosystem that works around the known security concerns of RC4.1IntroductionCryptographic algorithms can be broken into several major categories. First, they can be classified as public-key or private-key cryptosystems. Private-key systems are further separated into stream ciphers and block ciphers. Block ciphers generally encrypt a large block of plaintext at a time, whereas stream ciphers encrypt one datum at a time. Stream ciphers are popular for several reasons. The first stream cipher, known as a one-time pad, [Ver26] is the only cryptosystem that has been proven to be unbreakable [Sha49].However, the one-time pad had serious key management and distribution problems, so it was abandoned. Since then, stream ciphers have attempted to duplicate the one-time pad’s security while at the same time avoiding its key management problems.Stream ciphers are also generally much faster than block ciphers because of the way they operate. The keystream for a stream cipher is oftentimes generated independently of the plaintext. In fact, the keystream can even be generated prior to the encryption step. During encryption, each element of the keystream is combined with each element of the plaintext to produce the ciphertext. The combining function used is usually the exclusive or operator (XOR). In the past, stream ciphers usually implemented a combination of linear feedback shift registers (LFSRs). However,
2attacks have been developed that will break most systems of LFSR-based stream ciphers. 2The RC4 Stream CipherRC4, Which stands for “Ron’s Code 4,” [RivFAQ] is an example of a stream cipher that does not use LFSRs. Ronald Rivest designed it for RSA Data Security, Inc. (RSADSI) in 1987. It was, and is still considered by RSADSI to be confidential and proprietary. However, in 1994 an anonymous contributor posted an algorithm to the Cypherpunks mailing list that has since proven to be compatible with RC4 [Cyp94]. Henceforth, this alleged RC4 algorithm will be referred to as RC4, because it is overwhelmingly likely that it is the same as the official RC4 algorithm. The legal status of RC4 isthe source of some debate [Sch96] [Rei97]. There are two ways to protect an invention: either patent it or keep it a trade secret. Keeping an invention as a trade secret is dangerous because it can be leaked, reverse-engineered, or otherwise discovered by the public. Since RC4 has apparently been leaked, it can no longer be considered a trade secret. However, RSADSI would most likely attempt to sue anyone who uses RC4 in a commercial application without a license, and the cost of litigation would probably outweigh the cost of obtaining a license.RC4 is a very popular stream cipher. First of all, it is extremely fast. Optimized versions of RC4 can encrypt over 20MB of data every second on a 150MHz Pentium [SW97]. In addition it is simple enough to code from memory and it is still unbroken after over a decade. It is used in Lotus Notes and Oracle Secure SQL [Sch96], the Secure Sockets Layer and Secure Shell protocols, and dozens of other applications. It is small both in code size because of its simple algorithm and in memory footprint because of its 256-byte state table. Lastly, it is also popular because it is unusual. RC4 is one of the few strong stream ciphers that do not use LFSRs.3The RC4 AlgorithmLike most stream ciphers, RC4 generates a keystream from its internal state. The cipher operates in OFB mode, which means that the next state is derived from the current state and the current keystream byte [RSAFAQ]. RC4 uses an array of 256 bytes containing a permutation of the integers 0 through 255 as its internal state. Its operation has two phases: the setup phase and the encryption/decryption phase. All math is done modulo 256, which is the size of the state table. During the setup phase, the state table is first initialized such thatstate[i]=i i=[0, 255]. This is done in lines 107-108 (please refer to the attached source code for line numbers). Next, the key is mixed into the state table in lines 114-117. For each of 256 iterations, i is incremented (line 114). Then, j gets incremented by the ithelement of the state and the ithelement of the key in line 115. Notice the modulus operator causes the key to effectively wrap around on itself, so that a key of length less than 256 may be used. Finally, the elements indexed by i andj are swapped in line 116.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Quality Assignments
Unique Academic Solutions
Top Academic Tutor
Write My Coursework
Homework Guru
Financial Hub
Writer Writer Name Offer Chat
Quality Assignments

ONLINE

Quality Assignments

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$67 Chat With Writer
Unique Academic Solutions

ONLINE

Unique Academic Solutions

I have assisted scholars, business persons, startups, entrepreneurs, marketers, managers etc in their, pitches, presentations, market research, business plans etc.

$77 Chat With Writer
Top Academic Tutor

ONLINE

Top Academic Tutor

I have worked on wide variety of research papers including; Analytical research paper, Argumentative research paper, Interpretative research, experimental research etc.

$54 Chat With Writer
Write My Coursework

ONLINE

Write My Coursework

I am an elite class writer with more than 6 years of experience as an academic writer. I will provide you the 100 percent original and plagiarism-free content.

$65 Chat With Writer
Homework Guru

ONLINE

Homework Guru

As an experienced writer, I have extensive experience in business writing, report writing, business profile writing, writing business reports and business plans for my clients.

$56 Chat With Writer
Financial Hub

ONLINE

Financial Hub

I have read your project details and I can provide you QUALITY WORK within your given timeline and budget.

$63 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Panera bread supply chain analysis - Ocr nationals ict level 2 - WEEK 6 DISCUSSION HSA551 - Woodcock reading mastery test 3rd edition - The baldwin company currently has the following balances - Introduction to policing Assignment - It's a long way from amphioxus - Ato tax file declaration pdf - Furniture for homeless veterans - Assigm 5 IPT - Current issues in hrm ppt - Preliminary parts of a research paper - Adulterants in sugar pdf - Applied paediatric neuropsychology msc - University of hertfordshire holidays - Example of a character sketch bible study - Ilaw dagitab meaning tagalog - Matthew 5 43 48 relevance to other worldviews - Create an annotated bibliography based on the following topic: The impact of space travel on the human body. - Oracle erp implementation at maruti suzuki - Dq - What is a personification example - Saskia sassen global cities and survival circuits - City of moreland grants - Heritage 3000 garage door - Counseling the culturally different theory and practice - Null to null bandwidth - Health Care Field Research Draft - Woolworths everyday credit card - Ethica and Legal Aspects of Nursing Practice DQ 9 student reply Lisney Caraballo - Written warning template for attitude - Business problem solving using excel 2016 simnet - Which of the following will result in a future value greater than $100? - Wk 3 - Apply: Online Interactions - Bsbwor501b assessment - Glenn dove medium baldwin ny - Faculty washington memory test - Comm skills - Live feature on pof - Social networking site for social responsibility project - What does mechanical advantage mean in science - Data visualisation a handbook for data driven design andy kirk - Module 4 Discussion-Obesity - Introduction to programming using python liang - 504 PLAN - Netflix innovation case study - Lección 4 estructura 4.2 practicar verbos - I just wanna be average essay - St andrew's hospital billericay blood tests - Why is back titration used - Automated Code Review: WebGoat source code using the VCG SAST tool and verify the findings within the code. - Discussion - Team Assignment: Organizational Performance Management Presentation - Iron 3 chloride msds - Greek goddess of marriage - Harbor square athletic club membership price - Benefits of xs energy drink - Design a feminist button - In text citation vs footnotes - You are my sunshine chords frank turner - 67 oakview drive hallidays point - Environmental Policy SLA: Renewable Energy Paper - Which of the following statements applies to media planning - Drive theory arousal in sport - Redox titration vs acid base titration - City district government karachi - Amy, age 19 and single, has $8,050 of wages, $800 of interest, and $350 of self-employment income. - Alumahan fish in english - Pacific cataract and laser institute case study - Sres lópez la mantequilla por favor - James v meow media case brief - Math studies sl formula booklet - Pros and cons of gainsharing - Etikan musa & alkassim 2016 - Xhr send options hascontent && options data null error 500 - Importance of keeping an accurate appointment book - NURS495JOURNALWEEK2 - Bruce highland trail oak scrape - Chasseur de bolides counting cars supercharged - Julian dream doctor comprehension questions - King's goal attainment theory ppt - Fossil meaning in latin - Debbie vickers puberty blues - Pulse connect secure admin guide - Help in writing letter and user manual - Craig kielburger obstacles - Business Intelligence (Discu1) - Tinsel season 10 episode 2178 - Gas meter box replacement responsibility - Muscle fatigue lab answer key - Assignment 3 creating training tools 200 pts - Principles of Marketing (2 Modules completed) - Calculate the molarity of the vinegar sample - Information technology for managers reynolds - Coal tar enamel coating properties - Nanda nursing diagnosis for hyponatremia - Wayne abbott equine dentist - Future trends - SYSTEMS-ANALYTICS-&-ENT-MGMT-IT - Maslow's theory mcdonalds