과제정보
This work was supported by the research grant of the University Grants Commission (UGC), New Delhi, India under the grant No. 415024.
참고문헌
- R.S. Ismael, R.S. Youail, S. Wahhab, Image encryption by using RC4 algorithm, European Academic Research 4 (2014), 5833-5839.
- B. Mondal, N. Sinha, T. Mandal, A secure image encryption algorithm using LFSR and RC4 stream generator, Proceedings of 3rd International Conference on Advanced Computing, Networking and Informatics 2015.
- C. Jin and Z. Tu, A novel color image encryption algorithm using chaotic map and improved RC4, Proceedings of Advances in Intelligent Systems and Computing Springer, Ukraine, 2016. doi:10.1007/978-3-319-33389-2_1
- A. Dena and I. Salah, Image encryption algorithm based on RC4 and Henon map, Journal of Theoretical and Applied Information Technology 96 (2018), 7065-7076.
- A. Susanto, D.R.I. Setiadi, C.A. Sari, M.K. Sarker, Triple layer image security using bit-shift, chaos and stream encryption, Bulletin of Electrical Engineering and Informatics 9 (2020), 980-987. https://doi.org/10.11591/eei.v9i3.2001
- A.B. Joshi, D. Kumar, A. Gaffar, D.C. Mishra, Triple color image encryption based on 2D multiple parameter fractional discrete Fourier transform and 3D Arnold transform, Optics and Lasers in Engineering 133 (2020), 106-139.
- D. kumar, A.B. Joshi, V.N. Mishra, Optical and digital double color-image encryption algorithm using 3D chaotic map and 2D multiparameter fractional discrete transform, Results in Optics (2020). doi.org/10.1016/j.rio.2020.100031
- A.B. Joshi, D. Kumar, D.C. Mishra, V. Guleria, Colour-image encryption based on 2D discrete wavelet transform and 3D logistic chaotic map, Journal of Modern Optics 67 (2020), 933-949. https://doi.org/10.1080/09500340.2020.1789233
- A.B. Joshi, D. Kumar, D.C. Mishra, Security of digital images based on 3D Arnold cat map and elliptic curve, International Journal of Image and Graphics 20 (2020). doi:10.1142/S0219467821500066
- D. Kumar, A.B. Joshi, V.N. Mishra, Optical and digital double color-image encryption algorithm using 3D chaotic map and 2D-multiple parameter fractional discrete cosine transform, Results in Optics 1 (2020). doi.org/10.1016/j.rio.2020.100031
- T. Rachwalik, J. Szmidt, R. Wicik, J. Zablocki, Generation of nonlinear feedback shift registers with special-purpose hardware, Military Communications and Informations Systems Conference Poland, 2012.
- B. Schneier, Applied Cryptography: Protocols, Algorithms and Source Code in C, John Wiley and Sons, New York, 1996.
- T. Dierks and C. Allen, The TLS protocol, version 1.0, Internet Engineering Task Force (IETF) 1999, https://www.rfc-editor.org/rfc/rfc2246.txt (Last accessed Oct 11, 2020).
- S. Paul and B. Preneel, A new weakness in the RC4 keystream generator and an approach to improve the security of the cipher, FSE 2004: LNCS Springer-Verlag 3017 (2004), 245-259.
- E. Tews and M. Beck, Practical attacks against WEP and WPA, Proceedings of the 2nd ACM Conference on Wireless Network Security Switzerland, 2009, 79-86.
- A. Popov, Prohibiting RC4 cipher suites, RFC 7465 (2015), (Last accessed Oct 11, 2020). https://tools.ietf.org/html/rfc7465
- S. Fluhrer, I. Mantin, A. Shamir, Weaknesses in the key scheduling algorithm of RC4, Selected Areas in Cryptography 2259 (2001), 1-24. https://doi.org/10.1007/3-540-45537-X_1
- A. Klein, Attacks on the RC4 stream cipher, Designs, Codes and Cryptography 48 (2008), 269-286. https://doi.org/10.1007/s10623-008-9206-6
- N. AlFardan, D. Bernstein, K. Paterson, On the security of RC4 in TLS and WPA, Information Security Group, Royal Holloway, University of London, 2013.
- A. Maximov, Two linear distinguishing attacks on VMPC and RC4A and weakness of RC4 family of stream ciphers, Cryptology e-Print Archive Report 2007/070 (2007), https://eprint.iacr.org/2007/070 (Last accessed Oct 11, 2020).
- Y. Tsunoo, T. Saito, H. Kubo, The most efficient distinguishing attack on VMPC and RC4A, FSE 2005: LNCS Springer-Heidelberg 3557 (2005), 359-367.
- A. Menezes, P. Oorschot, S. Vanston, Handbook of Applied Cryptography, CRC Press, New York, 1996.
- R. Wicik and M. Borowski, Randomness testing of some random and pseudo-random sequences, Military Communication Conference Prague, 2008.
- B. Jenkins, Re: RC4 ?, Newsgroup: sci.crypt. 1994, (Last accessed Oct 11, 2020). https://groups.google.com/g/sci.crypt/c/JsO3xEATGFA/m/-wO4ttv7BCYJ?pli=1
- A. Roos, A class of weak keys in the RC4 stream cipher, 1995, (Last accessed Oct 11, 2020). https://groups.google.com/forum/message/raw?msg=sci.crypt.research/M7M4UdmbxA8/-zOp2nSSpigcJ
- I. Mironov, (Not So) Random Shuffles of RC4, Advances in Cryptology, CRYPTO 2002: LNCS Springer-Verlag 2442 (2002), 304-319.
- E. Biham and A. Shamir, Differential Cryptanalysis of the Data Encryption Standard, Springer-Verlag, New York, 1993.
- M. Matsui, The first experimental cryptanalysis of the Data Encryption Standard, CRYPTO 1994: Proceedings of LNCS Springer 839 (1994), 1-11.
- M. Gaata and F. Hantoosh, An efficient image encryption technique based on chaotic logistic map and RC4 stream cipher, International Journal of Modern Trends in Engineering and Research, 3 (2016), 213-218. https://doi.org/10.21884/IJMTER.2016.3068.YIAPY
- N. Saptarini and Y. Alberth, Digital color image encryption using RC4 stream cipher and chaotic logistic map, Information Systems International Conference 2013 (2013), 459-464.