RC4 encryption-A literature survey

P **dal, B Singh - Procedia Computer Science, 2015 - Elsevier
A chronological survey demonstrating the cryptanalysis of RC4 stream cipher is presented in
this paper. We have summarized the various weaknesses of RC4 algorithm followed by the …

A secure energy-saving communication and encrypted storage model based on RC4 for EHR

J Zhang, H Liu, L Ni - Ieee Access, 2020 - ieeexplore.ieee.org
The commercialization of 5G has greatly promoted the development of medical Internet of
Things (IoT). More medical devices connected to the Internet may further increase the …

RETRACTED ARTICLE: An hybrid security framework using internet of things for healthcare system

SS Kumar, MS Koti - Network Modeling Analysis in Health Informatics and …, 2021 - Springer
In recent decades, broad range of Internet of Things (IoT) technologies are deployed such
as machine to machine communication, Internet Technologies (IT), robots, smart devices …

[PDF][PDF] Improvement of RC4 security algorithm

HH Al-badrei, IS Alshawi - Adv. Mech, 2021 - faculty.uobasrah.edu.iq
Data confidentiality is the most important security service at present, and to ensure access to
this service, efficient encryption algorithms are used to overcome unauthorized access to …

[HTML][HTML] Measuring avalanche properties on RC4 stream cipher variants

EJ Madarro-Capó, CM Legón-Pérez, O Rojas… - Applied Sciences, 2021 - mdpi.com
In the last three decades, the RC4 has been the most cited stream cipher, due to a large
amount of research carried out on its operation. In this sense, dissimilar works have been …

[PDF][PDF] A survey on RC4 stream cipher

P **dal, B Singh - International Journal of Computer Network and …, 2015 - academia.edu
RC4 is one of the most widely used stream cipher due to its simplicity, speed and efficiency.
In this paper we have presented a chronological survey of RC4 stream cipher demonstrating …

[PDF][PDF] Secure image transmission over wireless network

SA Aliesawi, DS Alani, AM Awad - International Journal of …, 2018 - academia.edu
The advances recently seen in data compression, and communication systems, have made
it viable to design wireless image transmission systems. For many applications such as …

[PDF][PDF] An effective color image encryption scheme based on double piecewise linear chaotic map method and rc4 algorithm

DW Ahmed, TM Jawad… - Journal of Engineering …, 2021 - jestec.taylors.edu.my
Fast and secure data stored and transmission through a modern communication and
information system are the core objective in this area. With regard to this study, efficient and …

Machine learning for cryptographic algorithm identification

F Barbosa, A Vidal, F Mello - Journal of Information Security …, 2016 - enigmajournal.unb.br
This paper aims to study encrypted text files in order to identify their encoding algorithm.
Plain texts were encoded with distinct cryptographic algorithms and then some metadata …

RC4D: A New Development of RC4 Encryption Algorithm

R Alsharida, M Hammood, MA Ahmed… - Selected Papers from …, 2021 - Springer
Cryptography is one of the essential methods for securing the information. In cryptography,
there are many encryption algorithms; some of them strong where the others are broken …