Optimization of the Security-Performance Tradeoff in RC4 Encryption Algorithm

被引:0
作者
Poonam Jindal
Brahmjit Singh
机构
[1] National Institute of Technology,Electronics and Communication Engineering Department
来源
Wireless Personal Communications | 2017年 / 92卷
关键词
Complexity; RC4; Randomness; Secret key encryption; Security attacks;
D O I
暂无
中图分类号
学科分类号
摘要
In this paper, we have investigated different vulnerabilities in RC4 and its enhanced variants to overcome the security attacks. It is established that in spite of several proposals, RC4 is not secure enough and a trade-off is always sought between security and network performance for overall provisioning of the secure communication. The main goal of the work presented in this paper is the optimization of security-performance tradeoff. We have proposed three RC4 variants referred to as RC4-M1, RC4-M2 and RC4-M3. Security of the proposed schemes is analyzed in terms of randomness and computational complexity. All the proposed variants qualify the NIST statistical test suite of randomness satisfactorily. The proposed schemes also offer computational complexity in terms of greater number of operations relative to the existing variants. The strength of the proposed schemes has been analyzed against different cryptanalytic attempts and shown the resistance of proposed schemes against attacks. The security-performance tradeoff has been analyzed in terms of run time, CPU cycles consumed, energy cost, and throughput. Encryption time of the proposed schemes—RC4-M1, RC4-M2 and RC4-M3 is 30.1, 10 and 48.7 % less as compared to RC4+ respectively. The results clearly indicate that the computation load of the proposed variants is significantly reduced as compared to the RC4+, concluding that the proposed schemes are computationally efficient. Our results and their analysis also recognize the suitability of the security algorithms for particular application areas.
引用
收藏
页码:1221 / 1250
页数:29
相关论文
共 52 条
  • [1] Nawaz Y(2005)A 32-bit RC4-like keystream generator IACR Cryptology ePrint Archive 2005 175-705
  • [2] Gupta KC(2006)Pypy: Another version of Py eSTREAM, ECRYPT Stream Cipher Project, Report 38 2006-134
  • [3] Gong G(2015)RC4 encryption-A literature survey Procedia Computer Science 46 697-286
  • [4] Biham E(2008)On non-negligible bias of the first output byte of RC4 towards the first three bytes of the secret key Designs, Codes and Cryptography 49 123-1727
  • [5] Seberry J(2007)Differential cryptanalysis in stream ciphers IACR Cryptology ePrint Archive 2007 218-108
  • [6] Jindal P(2008)Attacks on the RC4 stream cipher Designs, Codes and Cryptography 48 269-330
  • [7] Singh B(2007)Finding an internal state of RC4 stream cipher Information Sciences 177 1715-289
  • [8] Paul G(2008)Iterative probabilistic reconstruction of RC4 internal states IACR Cryptology ePrint Archive 2008 348-45
  • [9] Rathi S(2014)(Non-) Random Sequences from (Non-) Random Permutations—Analysis of RC4 stream cipher Journal of Cryptology 27 67-961
  • [10] Maitra S(2013)Proving TLS-attack related open biases of RC4 IACR Cryptology ePrint Archive 2013 502-305