Home            Contact us            FAQs
    
      Journal Home      |      Aim & Scope     |     Author(s) Information      |      Editorial Board      |      MSP Download Statistics

     Research Journal of Applied Sciences, Engineering and Technology


Improved RC4 Algorithm Based on Multi-Chaotic Maps

1Naji Mutar Sahib, 1Ali Hussein Fadel and 2Noora Shihab Ahmed
1Department of Computer Science, University of Diyala, Baghdad
2Department of Computer Science, University of Halabja, Kurdistan, Iraq
Research Journal of Applied Sciences, Engineering and Technology  2018  1:1-6
http://dx.doi.org/10.19026/rjaset.15.5285  |  © The Author(s) 2018
Received: October 31, 2016  |  Accepted: February 13, 2017  |  Published: January 15, 2018

Abstract

The aim of this study is to overcome on the weakness points in RC4 (Rivest Cipher 4) algorithm, there are some blemishes in the Key Scheduling Algorithm (KSA) of RC4. This study presented improved RC4 key generation based on multi-chaotic maps. The new version of KSA coined as improved KSA (IKSA), the permutation of the S array modified to depend on the random numbers generator based on three chaotic maps and the proposed algorithm outputs as follows: Output = M XOR Generated key XOR Random value from IKSA (R3w) The improved RC4 with IKSA is tested for its secrecy, randomness and performance over the variable key length and different plaintext size with respect to those of the original RC4.The results show that the improved RS4 with IKSA is better than the original RC4 with KSA.

Keywords:

Average secrecy, key scheduling algorithm, multi-chaotic maps, RC4,


References

  1. Ahmed, N.S., 2016. Multi-image encryption technique based on permutation of chaotic system. Int. J. Video Image Process. Netw. Secur., 16(1): 9-18.
  2. Crainicu, B., 2015. On invariance weakness in the KSAm algorithm. Proc. Technol., 19: 850-857.
    CrossRef    
  3. Fluhrer, S., I. Mantin and A. Shamir, 2001. Weaknesses in the key scheduling algorithm of RC4. In: Vaudenay, S. and A.M. Youssef (Eds.), Selected Areas in Cryptography. SAC, 2001. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg, 2259: 1-24.
    CrossRef    
  4. Hameed, S.M. and I.N. Mahmood, 2016. A modified key scheduling algorithm for RC4. Iraq. J. Sci., 57(1A): 262-267.
  5. Prasadh, K., K. Ramar and R. Gnanajeyaraman, 2009. Public key cryptosystems based on chaotic chebyshev polynomials. J. Eng. Technol. Res., 1(7): 122-128.
    CrossRef    
  6. Rahma, A.M.S. and Z.M. Hussein, 2015. Modified RC4 dual key algorithm based on irreducible polynomial. Int. J. Emerg. Trend. Technol. Comput. Sci., 4(2): 79-85.
  7. Stallings, W., 2011. Cryptography and Network Security Principles and Practices. 5th Edn., Pearson Education Inc., Pearson Prentice Hall, USA.
  8. Wenbo, M., 2003. Modern Cryptography: Theory and Practice. 1st Edn., Prentice Hall, Upper Saddle River, NJ, pp: 707.
  9. Weerasinghe, T.D.B., 2012. Analysis of a modified RC4 algorithm. Int. J. Comput. Appl., 51(22): 12-17.

Competing interests

The authors have no competing interests.

Open Access Policy

This article is distributed under the terms of the Creative Commons Attribution 4.0 International License (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, distribution, and reproduction in any medium, provided you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Copyright

The authors have no competing interests.

ISSN (Online):  2040-7467
ISSN (Print):   2040-7459
Submit Manuscript
   Information
   Sales & Services
Home   |  Contact us   |  About us   |  Privacy Policy
Copyright © 2024. MAXWELL Scientific Publication Corp., All rights reserved