Increasing security for RC4 algorithm by using PUF-based random number generators

  • Authors

    • Naji Mutar Sahib
    • Hazim Noman Abed
    • wasan Saad Ahmed
    https://doi.org/10.14419/ijet.v7i4.21751
  • Rivest Cipher 4 (RC4) algorithm is the considerably stream cipher, and can be used of internet protocols. There is a quantity of weaknesses bytes even after the first 256 rounds (the size of the RC4 permutation) of the Pseudo random generation algorithm (PRGA). So far various modified RC4 research were presented but all of them have either ordinary privacy or accomplishment evaluation challenges. This paper introduces enhanced RC4 algorithm depending on Physical Unclonable Function (RC4 - PUF) which has solved both of these challenges. The principal development of the proposed RC4 - PUF methodology is that the changing of the s array reorganized to rely on the creation of a specific hardware random generator Method (HRGA) and the proposed methodology outcomes as follows:

    Output = Plaintext XOR generated key XOR random values from HRGA.

    The outcome of the tests demonstrates the refinement of the privacy of ciphers (average secrecy), randomness and accomplishment assessment (Encryption time and throughputs) over the variable key length and miscellaneous plaintext size of the proposed encryption RC4 – PUF methodology.

     

  • References

    1. [1] A Book: Craincu, B., 2015 “On Invariance Weakness in the KSA Algorithmâ€. Procardia Technology, Elsevier, 19. pp: 850-857.

      [2] P. Kohlbrenner, K. Gaj, (2004) “An embedded true random number generator for FPGAsâ€, 12th international symposium on Field programmable gate arrays, FPGA '04, Pages 71--78.

      [3] Naji Mutar Sahib, Ali Hussein Fadel and Noora shihab Ahmed, (2018), "Improved Rivest Cipher 4 Algorithm Based on multi-chaotic Maps", Research journal of Applied Sciences, Engineering and Technology, 15(1), 1-6. https://doi.org/10.19026/rjaset.15.5285.

      [4] Journal Articles: T.D.B Weerasinghe, 2012,†Analysis of a Modified RC4 Algorithmâ€. IJCA (0975-c xczs8887) Vol.51-No.22, p: 12-17.

      [5] Journal Articles: Sarab M. Hameed, and Israa Nafea Mahmood, 2016,†A Modified Key Scheduling Algorithm of RC4â€. Selected Areas in Cryptography.2259, Iraqi Journal of Science, (ISSN: 0067-2904), Vol. 57, No.1A, pp: 262-267.

      [6] Journal Articles: Fluhrer.S, Mantin, I. and Shamir, 2001, A.†Weaknesses in the key scheduling algorithm of RC4â€. Selected Areas cryptography, 2259, pp: 1-24.

      [7] Pardeep and Pushpendra,†A pragmatic study over the different stream cipher and on different flavor of RC4 stream cipherâ€, International Journal of Computer Science and Network Security, vol. 12, no. 3, pp. 37-42, 2012.

      [8] I. Mantin, A. Shamir,†A practical attack on broadcast RC4â€, FastSoftware Encryption, LNCS 2355, pp. 152-164, 2001.

      [9] G. Paul, S. Maitra,†RC4 state in formation at any stage reveals the secret keyâ€, in Presented in the 14th Annual Workshop on Selected Areas in Cryptography, SAC, Ottawa, Canada, LNCS vol. 4876, pp. 360-377, 2007.

      [10] A. Aboshosha, K. A. ElDahshan, E. K. Elsayed and A. A. Elngar, 2015, "EA Based Dynamic Key Generation in RC4 Ciphering Applied to CMS", IJNS, Vol. 17, No. 4, pp, 405-412.

      [11] A Book: Stallings W., 2011,†Cryptography and Network Security Principles and Practices, Fifth Editionâ€. Pearson Education, Inc. Pearson Prentice Hall, USA.

      [12] A Book: Mao W., 2003, “Modern Cryptography: Theory and Practiceâ€. Prentice Hall PTR.

      [13] Journal Articles: Abdul M.S. Rahma, and Zainab M. Hussein, 2015,†Modified RC4 Dual key algorithm based on Irreducible Polynomialâ€. IJETTCS, Vol.4, Issue 2, p 79-85.

      [14] G. Paul, S. Maitra,†RC4 state in formation at any stage reveals the secret keyâ€, in Presented in the 14th Annual Workshop on Selected Areas in Cryptography, SAC, Ottawa, Canada, LNCS vol. 4876, pp. 360-377, 2007.

      [15] J.-W. Lee, D. Lim, B. Gassend, G. E. Suh, M. van Dijk, and S. Devadas, " A technique to build a secret key in integrated circuits with identiï¬cation and authentication applications", Proceedings of the IEEE LSI Circuits Symposium, June 2004.

      [16] Suh, G. Edward, and SrinivasDevadas, "Physical unclonable functions for device authentication and secret key generation.†Proceedings of the 44th annual Design Automation Conference. ACM, 2007.â€

  • Downloads

  • How to Cite

    Sahib, N. M., Abed, H. N., & Ahmed, wasan S. (2018). Increasing security for RC4 algorithm by using PUF-based random number generators. International Journal of Engineering & Technology, 7(4), 3667-3673. https://doi.org/10.14419/ijet.v7i4.21751