RC4 stream cipher and possible attacks on WEP (original) (raw)

Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications

2013

Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications A.M.Riad1, Alaa R.Shehata2 , Hamdy K.Elminir3and Taha R.Ibrahim4 Abstract— The trend toward converged networks where voice, IP, video and wireless are combined over the same network infrastructure offers significant – and highly attractive – benefits. But this union introduces new vulnerabilities and new opportunities to break into the network and so we need converged security. In this paper we investigate the possibility of using RC4 as a stream key generator for converged network applications. The RC4 was statistically tested against wide range of tests for inspecting the validity of the encryption, and it's mathematically measured for encryption efficiency. All the consequent proves that RC4 with suitable key length is highly secure and efficient enough to be used within the converged network.

A Light Weight Enhancement to RC4 Based Security for Resource Constrained Wireless Devices

The Wired Equivalent Privacy (WEP) uses the 64 bit RC4 secret key stream cipher as its layer 2 security protocol. Although the underlying RC4 cipher is secure, the potential reuse of the same key stream by different frames is a weakness in the WEP. One enhancement to WEP is the Temporal Key Integrity Protocol (TKIP), which acts as a wrapper to the WEP protocol and uses a 128 bit RC4 encryption to eliminate the possibility of key reuse within a given session. However, TKIP cannot be gainfully employed in devices where the 64 bit RC4 encryption is hardwired. Also, with 128 bit encryption TKIP can secure 1030 frames per session. Comparing this to the typical number of frames per session (500-1000), it is easy to see that the use of a 128 bit key causes unnecessary drain of power. The Wifi Protected Access (WPA), uses a 128 bit Advanced Encryption Standard (AES) cipher in the Counter-Mode-CBC-MAC Protocol (CCMP). This protocol requires higher computational power than the TKIP and is onl...

IJERT-An Approach For Securing RC4 Algorithm

International Journal of Engineering Research and Technology (IJERT), 2014

https://www.ijert.org/an-approach-for-securing-rc4-algorithm https://www.ijert.org/research/an-approach-for-securing-rc4-algorithm-IJERTV3IS071059.pdf In few past decades various internet traffic security algorithms gained quick popularity and RC4 algorithm for internet traffic can be cited as most prominent or proficient technology today. The Transport Layer Security (TLS) provides confidentiality and integrity of data when data transmits across unsecure network. TLS supports several encryption methods but in this paper TLS uses RC4 for encryption. RC4 is a stream cipher. It mainly consists of two algorithms. First one is KSA and another is PRGA. RC4 is extremely fast when implemented in software but at the cost of lower security. This paper present a work on KSA and PRGA that helps in improving the RC4 algorithm for secure the internet traffic. Main work focus on the key length and the variable multiplication in the both algorithms that generates the encrypted secure text. The proposed work provide the secure encrypted algorithm for achieving more security in RC4.

A hybrid cryptosystem based on WEP for 802.11 networks

Journal of Computational Methods in Sciences and Engineering

Wireless is the next generation networking technology. The security of such technology is very critical because its physical layer is the electro-magnetic waves that can be easily intercepted by anyone. The original security protocol for 802.11 wireless networks is called WEP (Wired Equivalent Privacy). It is a protocol that is based on symmetric-key encryption algorithm RC4 (Rivest Cipher 4). Unfortunately, this protocol had many flaws that made it exposed to many attacks. This paper presents a set of improvements for WEP, which include key management and distribution, and authentication. These improvements convert WEP to a hybrid cryptosystem, a system that is based on both a symmetric-key algorithm and an asymmetric-key algorithm.

Strengthening the Encryption Mechanism in WEP Protocol

2012

Wi-Fi is serving as a standard for broadband connectivity in homes, offices, and at many public locations. WEP is a security protocol for WLANs designed to give security equivalent to that provided on Wired Networks. It is a framework that uses RC4 encryption algorithm. Many flaws had been discovered in the RC4 algorithm by the experts. In the RC4 the encryption is performed by a ‘bit-by-bit’ ‘exclusive or’ operation with the secret key and if the key becomes known by unauthorized individuals, the key is compromised and data of the sender in the network can be interpreted by the hackers. In this paper we analyze some weaknesses on the RC4 stream cipher which is used by WEP Protocol and we proposes an public key encryption scheme Elliptic Curve Cryptography (ECC) in WEP which will overcomes the drawbacks of RC4 encryption Protocol and further we analyze the NAF and Block Method of Point Multiplication in ECC. The proposed ECC encryption will provide the secure encryption mechanism in...