Analysis of RC4 Crypts Using PSO Based Swarm Technique

被引:2
|
作者
Din, Maiya [1 ]
Pal, Saibal K. [1 ]
Muttoo, S. K. [2 ]
机构
[1] DRDO, Sci Anal Grp, New Delhi 110054, India
[2] Univ Delhi, Delhi, India
关键词
Stream cipher; RC4; cryptosystem; Cryptanalysis; Swarm intelligence; Particle swarm optimization;
D O I
10.1007/978-981-13-0761-4_98
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RC4 Cryptosystem is a nonlinear byte level encryption system. This is the most widely used cryptosystem, created by Rivest for RSA Securities Inc. This has two modules known as Pseudo-Random number Generator and Key Scheduler. Key scheduler transforms an initial permutation to a random key permutation. Computational Swarm Intelligence (CSI) is a popular branch of Artificial Intelligence (AI). CSI-based techniques have been used to solve many hard problems of optimization. In this research paper, Discrete Particle Swarm Optimization (DPSO)-based novel technique is applied to solve RC4 stream cipher-based crypts. Authors attempt to find key bits using DPSO-based swarm technique to reduce the number of exhaustive searches significantly. According to obtained results, correct Key bits are computed for the crypts of length 100-300 characters.
引用
收藏
页码:1049 / 1056
页数:8
相关论文
共 50 条
  • [1] Impossible fault analysis of RC4 and differential fault analysis of RC4
    Biham, E
    Granboulan, L
    Nguyên, PQ
    FAST SOFTWARE ENCRYPTION, 2005, 3557 : 359 - 367
  • [2] A Steganographic Technique Based on VLSB Method using RC4 Stream Cipher
    Bardhan, Osmita
    Bhattacharya, Ansuman
    Sinha, Bhabani P.
    2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), 2014, : 1402 - 1407
  • [3] Cache Timing Analysis of RC4
    Chardin, Thomas
    Fouque, Pierre-Alain
    Leresteux, Delphine
    APPLIED CRYPTOGRAPHY AND NETWORK SECURITY (ACNS 2011), 2011, 6715 : 110 - 129
  • [4] Analysis methods for (alleged) RC4
    Knudsen, LR
    Meier, W
    Preneel, B
    Rijmen, V
    Verdoolaege, S
    ADVANCES IN CRYPTOLOGY - ASIACRYPT'98, 1998, 1514 : 327 - 341
  • [5] Performance analysis of encrypted data files by improved RC4 (IRC4) and original RC4
    Dey, Hemanta
    Roy, Uttam Kumar
    Advances in Intelligent Systems and Computing, 2008, 542 : 513 - 519
  • [6] Audio Steganography Technique using DCT-SWT with RC4 Encryption
    Octafian, Moch Rafi Nur
    Novamizanti, Ledya
    Safitri, Irma
    Sitepu, Richardo Praystihan
    2022 INTERNATIONAL CONFERENCE ON DATA SCIENCE AND ITS APPLICATIONS (ICODSA), 2022, : 35 - 40
  • [7] The analysis and realization of RC4 stream ciphers
    Zhuang, Peidong
    Ding, Qun
    Wang, Lu
    PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MODELLING AND SIMULATION (ICMS2009), VOL 4, 2009, : 448 - 452
  • [8] Using the RC4 encryption algorithm at the server
    Zhao Chun Yang
    NATIONAL TEACHING SEMINAR ON CRYPTOGRAPHY AND INFORMATION SECURITY (2010NTS-CIS), PROCEEDINGS, 2010, : 383 - 386
  • [9] RC4 in Hadoop Security using MapReduce
    Jayan, Anandu
    Upadhyay, Bhargavi R.
    2017 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE IN DATA SCIENCE (ICCIDS), 2017,
  • [10] Image Encryption using Modified RC4 Algorithm
    Hasan, Mahmoud H. S.
    Proceeding - 2023 IEEE 3rd International Maghreb Meeting of the Conference on Sciences and Techniques of Automatic Control and Computer Engineering, MI-STA 2023, 2023, : 430 - 434