Analysis of RC4 Crypts Using PSO Based Swarm Technique

被引:2
|
作者
Din, Maiya [1 ]
Pal, Saibal K. [1 ]
Muttoo, S. K. [2 ]
机构
[1] DRDO, Sci Anal Grp, New Delhi 110054, India
[2] Univ Delhi, Delhi, India
关键词
Stream cipher; RC4; cryptosystem; Cryptanalysis; Swarm intelligence; Particle swarm optimization;
D O I
10.1007/978-981-13-0761-4_98
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
RC4 Cryptosystem is a nonlinear byte level encryption system. This is the most widely used cryptosystem, created by Rivest for RSA Securities Inc. This has two modules known as Pseudo-Random number Generator and Key Scheduler. Key scheduler transforms an initial permutation to a random key permutation. Computational Swarm Intelligence (CSI) is a popular branch of Artificial Intelligence (AI). CSI-based techniques have been used to solve many hard problems of optimization. In this research paper, Discrete Particle Swarm Optimization (DPSO)-based novel technique is applied to solve RC4 stream cipher-based crypts. Authors attempt to find key bits using DPSO-based swarm technique to reduce the number of exhaustive searches significantly. According to obtained results, correct Key bits are computed for the crypts of length 100-300 characters.
引用
收藏
页码:1049 / 1056
页数:8
相关论文
共 50 条
  • [41] Fault Detection and Correction Scheme using RC4 Stream Cipher
    Kiruba, S.
    Kirubaraj, A. Alfred
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATION AND SIGNAL PROCESSING (ICCSP), VOL. 1, 2016, : 311 - 314
  • [42] Full Plaintext Recovery Attacks on RC4 Using Multiple Biases
    Ohigashi, Toshihiro
    Isobe, Takanori
    Watanabe, Yuhei
    Morii, Masakatu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2015, E98A (01) : 81 - 91
  • [43] Securing Compressed Video Streams using RC4 Encryption Scheme
    Giradkar, Shrutika S.
    Bhattacharya, Antara
    2015 GLOBAL CONFERENCE ON COMMUNICATION TECHNOLOGIES (GCCT), 2015, : 628 - 632
  • [44] Metabolomics Analysis for Nitrite Degradation by the Metabolites of Limosilactobacillus fermentum RC4
    Xia, Chaoran
    Tian, Qiyuan
    Kong, Lingyu
    Sun, Xiaoqian
    Shi, Jingjing
    Zeng, Xiaoqun
    Pan, Daodong
    FOODS, 2022, 11 (07)
  • [45] Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
    Maitra, Subhamoy
    Paul, Goutam
    PROGRESS IN CRYPTOLOGY - INDOCRYPT 2008, 2008, 5365 : 27 - +
  • [46] The analysis of the number of fixed points in the key extending algorithm of RC4
    XU KeJian~(1+) HE Liang~1 DAI ZhaoPeng~1 FAN XiuBin~2 1 College of Mathematics
    ScienceinChina(SeriesA:Mathematics), 2008, (03) : 407 - 415
  • [47] An analysis of the RC4 family of stream ciphers against algebraic attacks
    Wong, Kenneth Koon-Ho
    Carter, Gary
    Dawson, Ed
    Conferences in Research and Practice in Information Technology Series, 2010, 105 : 67 - 74
  • [48] Generalized Classes of Weak Keys on RC4 Using Predictive State
    Teramura, Ryoichi
    Ohigashi, Toshihiro
    Kuwakado, Hidenori
    Morii, Masakatu
    IEICE TRANSACTIONS ON FUNDAMENTALS OF ELECTRONICS COMMUNICATIONS AND COMPUTER SCIENCES, 2011, E94A (01) : 10 - 18
  • [49] An RC4 based light weight secure protocol for sensor networks
    Zhang, Chang N.
    Yu, Qian
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL MULTI-CONFERENCE ON WIRELESS AND OPTICAL COMMUNICATIONS, 2006, : 536 - +
  • [50] Design of S-Box Based on Chao Initialized RC4
    Hanchinamani, Gururaj
    Narayan, D. G.
    Savakknavar, Rekha
    2021 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI), 2021,