Abstract
RC4 is a simple and fast cipher, which has proved itself as robust enough and it is trusted by many organizations. But a number of researchers claimed that RC4 has some weakness and bias in its internal states. To increase its security, some guidelines recommended discarding the first N or 2N bytes from the final output stream, where N is generally 256. In this paper, it has been statistically analyzed whether the outputs of the algorithm really acquire more security by discarding more number of initial bytes, like 4N or 8N. The original and modified algorithms are analyzed with NIST Statistical Test Suite and it has been tried to estimate an optimum quantity of output bytes to be discarded.
Talk to us
Join us for a 30 min session where you can share your feedback and ask us any queries you have
Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.