Analysis of RC4 Crypts Using PSO Based Swarm Technique

被引:2
|
作者
Din, Maiya [1 ]
Pal, Saibal K. [1 ]
Muttoo, S. K. [2 ]
机构
[1] DRDO, Sci Anal Grp, New Delhi 110054, India
[2] Univ Delhi, Delhi, India
关键词
Stream cipher; RC4; cryptosystem; Cryptanalysis; Swarm intelligence; Particle swarm optimization;
D O I
10.1007/978-981-13-0761-4_98
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RC4 Cryptosystem is a nonlinear byte level encryption system. This is the most widely used cryptosystem, created by Rivest for RSA Securities Inc. This has two modules known as Pseudo-Random number Generator and Key Scheduler. Key scheduler transforms an initial permutation to a random key permutation. Computational Swarm Intelligence (CSI) is a popular branch of Artificial Intelligence (AI). CSI-based techniques have been used to solve many hard problems of optimization. In this research paper, Discrete Particle Swarm Optimization (DPSO)-based novel technique is applied to solve RC4 stream cipher-based crypts. Authors attempt to find key bits using DPSO-based swarm technique to reduce the number of exhaustive searches significantly. According to obtained results, correct Key bits are computed for the crypts of length 100-300 characters.
引用
收藏
页码:1049 / 1056
页数:8
相关论文
共 50 条
  • [21] RC4-Hash: A new hash function based on RC4 - (Extended abstract)
    Chang, Donghoon
    Gupta, Kishan Chand
    Nandi, Mridul
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2006, PROCEEDINGS, 2006, 4329 : 80 - +
  • [22] Security Evaluation of RC4 using Big Data Analytics
    Liu, Cong
    Cai, Yong
    Wang, Taihong
    PROCEEDINGS OF 2016 IEEE 7TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS 2016), 2016, : 316 - 320
  • [23] ANN Based Distinguishing Attack on RC4 Stream Cipher
    Bhateja, Ashok K.
    Din, Maiya
    PROCEEDINGS OF SEVENTH INTERNATIONAL CONFERENCE ON BIO-INSPIRED COMPUTING: THEORIES AND APPLICATIONS (BIC-TA 2012), VOL 2, 2013, 202 : 101 - 109
  • [24] Secure RFID system based on RC4 chaotic algorithm
    Mei, Yuan
    Jiang, Yonghe
    Journal of Computational Information Systems, 2013, 9 (05): : 2083 - 2091
  • [25] New Analysis Based on Correlations of RC4 PRGA with Nonzero-Bit Differences
    Miyaji, Atsuko
    Sukegawa, Masahiro
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2010, E93A (06) : 1066 - 1077
  • [26] Separable Reversible Data Hiding Using Rc4 Algorithm
    Suresh, V.
    Saraswathy, C.
    2013 INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, INFORMATICS AND MEDICAL ENGINEERING (PRIME), 2013,
  • [27] Potential mechanism of nitrite degradation by Lactobacillus fermentum RC4 based on proteomic analysis
    Zeng, Xiaoqun
    Pan, Qing
    Guo, Yuxing
    Wu, Zhen
    Sun, Yangying
    Dang, Yali
    Cao, Jinxuan
    He, Jun
    Pan, Daodong
    JOURNAL OF PROTEOMICS, 2019, 194 : 70 - 78
  • [28] Robust Software Watermarking Scheme Using RC4 and HASH
    Sun, Xiaoyan
    Zhang, Maosheng
    Zhu, Xiaoshu
    Li, Shuoming
    NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 229 - 236
  • [29] Generalized Analysis on Key Collisions of Stream Cipher RC4
    Chen, Jiageng
    Miyaji, Atsuko
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (11) : 2194 - 2206
  • [30] Analysis of burn-in period for RC4 state transition
    Paul, Goutam
    Ray, Souvik
    CRYPTOGRAPHY AND COMMUNICATIONS-DISCRETE-STRUCTURES BOOLEAN FUNCTIONS AND SEQUENCES, 2018, 10 (05): : 881 - 908