Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Applied cryptography (2nd ed.): protocols, algorithms, and source code in C
Weaknesses in the Key Scheduling Algorithm of RC4
SAC '01 Revised Papers from the 8th Annual International Workshop on Selected Areas in Cryptography
TestU01: A C library for empirical testing of random number generators
ACM Transactions on Mathematical Software (TOMS)
Attacks on the RC4 stream cipher
Designs, Codes and Cryptography
Analysis of RC4 and Proposal of Additional Layers for Better Security Margin
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
Linear statistical weakness of alleged RC4 keystream generator
EUROCRYPT'97 Proceedings of the 16th annual international conference on Theory and application of cryptographic techniques
Breaking 104 Bit WEP in less than 60 seconds
WISA'07 Proceedings of the 8th international conference on Information security applications
Hi-index | 0.00 |
RC4, often referred to as Alleged RC4 (ARC4) in open literature, was and probably still is the most popular stream cipher. Although some weaknesses in its key scheduling algorithm have been reported and new faster and claimed secure stream ciphers have been proposed, ARC4 is likely to remain as a big player in cryptographic applications. In this paper, we propose a new variant of ARC4, called Modified ARC4 (MARC), which enhances the security of ARC4 by modifying its key scheduling algorithm and improves the performance by modifying its pseudo-random generation algorithm. MARC retains the simplicity of ARC4 and is faster than most software-efficient finalists of eStream.