Research Article

A High Throughput Algorithm for Data Encryption

by  A.Rathika, Parvathy Nair, M.Ramya
journal cover
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 13 - Issue 5
Published: January 2011
Authors: A.Rathika, Parvathy Nair, M.Ramya
10.5120/1777-2450
PDF

A.Rathika, Parvathy Nair, M.Ramya . A High Throughput Algorithm for Data Encryption. International Journal of Computer Applications. 13, 5 (January 2011), 13-16. DOI=10.5120/1777-2450

                        @article{ 10.5120/1777-2450,
                        author  = { A.Rathika,Parvathy Nair,M.Ramya },
                        title   = { A High Throughput Algorithm for Data Encryption },
                        journal = { International Journal of Computer Applications },
                        year    = { 2011 },
                        volume  = { 13 },
                        number  = { 5 },
                        pages   = { 13-16 },
                        doi     = { 10.5120/1777-2450 },
                        publisher = { Foundation of Computer Science (FCS), NY, USA }
                        }
                        %0 Journal Article
                        %D 2011
                        %A A.Rathika
                        %A Parvathy Nair
                        %A M.Ramya
                        %T A High Throughput Algorithm for Data Encryption%T 
                        %J International Journal of Computer Applications
                        %V 13
                        %N 5
                        %P 13-16
                        %R 10.5120/1777-2450
                        %I Foundation of Computer Science (FCS), NY, USA
Abstract

RC4 encryption algorithm [3,12,16] was examined based on the text to be encrypted and the chosen key. It is a symmetric key algorithm and uses stream cipher i.e. data is being encrypted bit by bit. The same algorithm is used for both encryption and decryption. The data stream is XORed with the generated key sequence and the key stream is completely independent of the plaintext used. The weakness of the algorithm has been found out and is being rectified. We proposed a modification in RC4 algorithm that would result in saving the memory space and also augment the performance by reducing the time. The proposed algorithm explains that we can have the key as an image so that we can compress it and store. Hence the algorithm yields better results in hardware also.

References
  • Allam Mousa and Ahmad Hamad ,“Evaluation of the RC4 Algorithm for Data Encryption”, International Journal of Computer Science and Applications, Vol 3,No. 2, June 2006
  • Bruce Schneier “Applied Cryptography-Protocols, Algorithms and Source code in C”.
  • Diffie.W and Hellman.M, “New Directions in cryptography," IEEE Transactions on Information Theory, vol. 22, no. 6, 1976
  • Ed Dawson, Helen Gustafson, Matt Henricksen, Bill Millan “Evaluation of RC4 Stream Cipher” Information Security Research Centre ,Queensland University of Technology
  • Eli Biham and Yaniv Carmeli, “Efficient Reconstruction of RC4 Keys from Internal States”, International Association for Cryptologic Research, 2008
  • Erica Simcoe, Hirsh Goldberg, and Mehmet Ucal, Advisor: Dr. Sennur Ulukus, “An Examination of Security Algorithm Flaws in Wireless Networks”
  • Guang Gong, Kishan Chand Gupta, Martin Hell and Yassir Nawaz, “Towards a General RC4-like Keystream Generator”
  • Guy E. Blelloch, “Introduction to Data Compression”, Computer Science Department Carnegie Mellon University, September 25, 2010.
  • Menezes. A, Van.P, Oorschot, and Vanstone.S, ”Handbook of Applied Cryptography”, CRC Press, 1996
  • Nadeem.A, “A performance comparison of data encryption algorithms," IEEE Information and Communication Technologies, 2006
  • Nathaniel Couture Kenneth B. Kent, “The Effectiveness of Brute Force Attacks on RC4”
  • PachghareV.K , Eastern Economy Edition, Cryptography and Information Security
  • “RC4 Encryption Algorithm” http://www.vocal.com
  • Rick Wash, “Lecture Notes on Stream Cipher and RC4”
  • Scott Fluhrer, Itsik Mantin, and Adi Shamir, ”Weaknesses in the key scheduling algorithm of RC4”
  • Stallings.W, Cryptography and Network Security, Prentice Hall, 4th Ed, 2005.
Index Terms
Computer Science
Information Sciences
No index terms available.
Keywords

RC4 (Rivest Cipher 4) algorithm Symmetric Key Assymetric Key

Powered by PhDFocusTM