RC4 encryption-A literature survey

P **dal, B Singh - Procedia Computer Science, 2015 - Elsevier
A chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in
this paper. We have summarized the various weaknesses of RC4 algorithm followed by the …

Cryptography in wireless multimedia sensor networks: A survey and research directions

DG Costa, S Figuerêdo, G Oliveira - Cryptography, 2017 - mdpi.com
Wireless multimedia sensor networks will play a central role in the Internet of Things world,
providing content-rich information for an uncountable number of monitoring and control …

Measuring avalanche properties on RC4 stream cipher variants

EJ Madarro-Capó, CM Legón-Pérez, O Rojas… - Applied Sciences, 2021 - mdpi.com
In the last three decades, the RC4 has been the most cited stream cipher, due to a large
amount of research carried out on its operation. In this sense, dissimilar works have been …

MRC4: A modified RC4 algorithm using symmetric random function generator for improved cryptographic features

R Saha, G Geetha, G Kumar, TH Kim… - IEEE Access, 2019 - ieeexplore.ieee.org
The Rivest Cipher 4 (RC4) has been one of the most popular stream ciphers for providing
symmetric key encryption, and is now proposed as an efficient cipher within light-weight …

Plain text encryption using AES, DES and SALSA20 by java based bouncy castle API on Windows and Linux

M Panda, A Nag - … Conference on Advances in Computing and …, 2015 - ieeexplore.ieee.org
Information Security has become an important element of data communication. Various
encryption algorithms have been proposed and implemented as a solution and play an …

Optimization of the security-performance tradeoff in RC4 encryption algorithm

P **dal, B Singh - Wireless Personal Communications, 2017 - Springer
In this paper, we have investigated different vulnerabilities in RC4 and its enhanced variants
to overcome the security attacks. It is established that in spite of several proposals, RC4 is …

RC4D: A New Development of RC4 Encryption Algorithm

R Alsharida, M Hammood, MA Ahmed… - Selected Papers from …, 2021 - Springer
Cryptography is one of the essential methods for securing the information. In cryptography,
there are many encryption algorithms; some of them strong where the others are broken …

Dynamic key dependent AES S-box generation with optimized quality analysis

P Partheeban, V Kavitha - Cluster Computing, 2019 - Springer
Non-linear substitution is the essential step in the most popular Advanced Encryption
Standard symmetric-key cryptosystem. Designing substitution boxes (S-boxes) with good …

Implementation of RC4 cryptography algorithm for data file security

AF Doni, OAH Maria, S Hanif - Journal of Physics: Conference …, 2020 - iopscience.iop.org
Communication in the digital age plays an important role, a person can carry out various
transactions or exchange data practically and quickly. So as to pose a great risk to …

A Comparative Study on the Performance of Security Mechanisms in Internet of Things Devices

M José - 2023 - preprints.org
Data security is a fundamental aspect to be considered in Internet of Things (IoT) information
gathering systems, as IoT is a network of interconnected devices that collect and share real …