Open Access

Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications


Cite

[1] SHINDER, D. : Deploying VoIP: Weigh the pros and cons of convergence http://articles.techrepublic.com.com/ 5100-10878 11-6187594.htm, May 31, 2007, last visit 7/8/2010.Search in Google Scholar

[2] Computers at Risk: Safe computing in the information age, USA National Research Council,1991.10.1016/0142-0496(91)90226-USearch in Google Scholar

[3] STALLING, W. : Cryptography and Network Security, Prentice Hall, 2005.Search in Google Scholar

[4] KNUDSEN, L.et al : Analysis Method for Alleged RC4, Proceedings ASIACRYPT ’98, 1998.10.1007/3-540-49649-1_26Search in Google Scholar

[5] MISTER, S., ANDTAVARES, S. : Cryptanalysis of RC4-Like Ciphers, Proceedings Workshop in Selected Areas of Cryptography SAC ’98, 1998.10.1007/3-540-48892-8_11Search in Google Scholar

[6] FLUHRER, S.-McGREW, D. : Statistical Analysis of the Alleged RC4 Key Stream Generator, Proceedings Fast Software Encryption, 2000.10.1007/3-540-44706-7_2Search in Google Scholar

[7] MANTIN, I.-HAMIR, A. : A Practical Attack on Broadcast RC4, Proceedings Fast Software Encryption, 2001.10.1007/3-540-45473-X_13Search in Google Scholar

[8] FLUHRER, S.-MANTIN, I.-SHAMIR, A. : Weakness in the Key Scheduling Algorithm of RC4., Proceedings Workshop in Selected Areas of Cryptography, 2001.10.1007/3-540-45537-X_1Search in Google Scholar

[9] RIAD, A. M.-SHEHATA, A. R.-HAMDY, E. K.-ABOUALSOUAD, M. H.-IBRAHIM, T. R. : Evaluation of the RC4 Algorithm as a Solution for Converged Networks, J. Electrical Engineering 60 No. 3 (June 2009).Search in Google Scholar

[10] A Statiistiical Test Suiite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, 2001.Search in Google Scholar

[11] ESSLINGER, B. : The CrypTool Script: Cryptography, Mathematics and More, www.cryptool.org,2008.Search in Google Scholar

[12] HOWITT, D. ANDCRAMER, D. : Statistics in Psychology, Prentice Hall, 2008.Search in Google Scholar

[13] ESSLINGER, B. : Cryptology with cryptool v 1.4.20, cryptool v1.4.21, www.cryptool.com, 2009.Search in Google Scholar

[14] Wikipedia.Search in Google Scholar

[15] SCHIESTL, C. : Pseudozufallszahlen in der Kryptographie, Klagenfurt, 1999.Search in Google Scholar

[16] http://www.bookrags.com/wiki/Berlekamp-Massey algorithm, Last visit 8/8/2010.Search in Google Scholar

[17] HOSAM, El-dinH. : Encryption Efficiency Analysis and Security Evaluation Of R C6 Block Cipher for Digital Images, International Journal of Computer, Information, System Science and Engineering 1 No. 1 (winter 2007).Search in Google Scholar

[18] HOSSAM, El-din H. AHMED-KALASH, H. M.-FARAG ALLAH, O. S. : Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images, Journal of Optical Engineering 45 (2006).10.1117/1.2358991Search in Google Scholar

ISSN:
1335-3632
Language:
English
Publication timeframe:
6 times per year
Journal Subjects:
Engineering, Introductions and Overviews, other