Have a personal or library account? Click to login
Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications Cover

Security Evaluation and Encryption Efficiency Analysis of RC4 Stream Cipher for Converged Network Applications

Open Access
|Jun 2013

References

  1. [1] SHINDER, D. : Deploying VoIP: Weigh the pros and cons of convergence http://articles.techrepublic.com.com/ 5100-10878 11-6187594.htm, May 31, 2007, last visit 7/8/2010.
  2. [2] Computers at Risk: Safe computing in the information age, USA National Research Council,1991.10.1016/0142-0496(91)90226-U
  3. [3] STALLING, W. : Cryptography and Network Security, Prentice Hall, 2005.
  4. [4] KNUDSEN, L.et al : Analysis Method for Alleged RC4, Proceedings ASIACRYPT ’98, 1998.10.1007/3-540-49649-1_26
  5. [5] MISTER, S., ANDTAVARES, S. : Cryptanalysis of RC4-Like Ciphers, Proceedings Workshop in Selected Areas of Cryptography SAC ’98, 1998.10.1007/3-540-48892-8_11
  6. [6] FLUHRER, S.-McGREW, D. : Statistical Analysis of the Alleged RC4 Key Stream Generator, Proceedings Fast Software Encryption, 2000.10.1007/3-540-44706-7_2
  7. [7] MANTIN, I.-HAMIR, A. : A Practical Attack on Broadcast RC4, Proceedings Fast Software Encryption, 2001.10.1007/3-540-45473-X_13
  8. [8] FLUHRER, S.-MANTIN, I.-SHAMIR, A. : Weakness in the Key Scheduling Algorithm of RC4., Proceedings Workshop in Selected Areas of Cryptography, 2001.10.1007/3-540-45537-X_1
  9. [9] RIAD, A. M.-SHEHATA, A. R.-HAMDY, E. K.-ABOUALSOUAD, M. H.-IBRAHIM, T. R. : Evaluation of the RC4 Algorithm as a Solution for Converged Networks, J. Electrical Engineering 60 No. 3 (June 2009).
  10. [10] A Statiistiical Test Suiite for Random and Pseudorandom Number Generators for Cryptographic Applications, NIST Special Publication 800-22, 2001.
  11. [11] ESSLINGER, B. : The CrypTool Script: Cryptography, Mathematics and More, www.cryptool.org,2008.
  12. [12] HOWITT, D. ANDCRAMER, D. : Statistics in Psychology, Prentice Hall, 2008.
  13. [13] ESSLINGER, B. : Cryptology with cryptool v 1.4.20, cryptool v1.4.21, www.cryptool.com, 2009.
  14. [14] Wikipedia.
  15. [15] SCHIESTL, C. : Pseudozufallszahlen in der Kryptographie, Klagenfurt, 1999.
  16. [16] http://www.bookrags.com/wiki/Berlekamp-Massey algorithm, Last visit 8/8/2010.
  17. [17] HOSAM, El-dinH. : Encryption Efficiency Analysis and Security Evaluation Of R C6 Block Cipher for Digital Images, International Journal of Computer, Information, System Science and Engineering 1 No. 1 (winter 2007).
  18. [18] HOSSAM, El-din H. AHMED-KALASH, H. M.-FARAG ALLAH, O. S. : Encryption Quality Analysis of RC5 Block Cipher Algorithm for Digital Images, Journal of Optical Engineering 45 (2006).10.1117/1.2358991
DOI: https://doi.org/10.2478/jee-2013-0029 | Journal eISSN: 1339-309X | Journal ISSN: 1335-3632
Language: English
Page range: 196 - 200
Published on: Jun 8, 2013
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2013 Alaa E Din Riad, Hamdy K. Elminir, Alaa R. Shehata, Taha R. Ibrahim, published by Slovak University of Technology in Bratislava
This work is licensed under the Creative Commons License.