Please use this identifier to cite or link to this item:
http://localhost:8081/xmlui/handle/123456789/15304
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Rocky, Swagatam Roy | - |
dc.date.accessioned | 2022-02-07T05:00:22Z | - |
dc.date.available | 2022-02-07T05:00:22Z | - |
dc.date.issued | 2019-05 | - |
dc.identifier.uri | http://localhost:8081/xmlui/handle/123456789/15304 | - |
dc.description.abstract | Since its public availability in 1994, RC4 has been extensively used for data – security measures. The specialty of RC4 lies within its formation – it is very easy to implement compared to other stream ciphers while providing excellent security. However, extensive research on the matter for more than two decades has exposed many frailties that lie within RC4 and how these frailties can be used to breach RC4. This has led to many modifications of the cipher along with the creation of various variants too. This dissertation focuses on analyzing the best of the heaps of research that has been done on RC4 since its birth and also to look into its computational efficiency compared to more modern versions of the cipher. | en_US |
dc.description.sponsorship | INDIAN INSTITUTE OF TECHNOLOGY, ROORKEE | en_US |
dc.language.iso | en | en_US |
dc.publisher | I I T ROORKEE | en_US |
dc.subject | RC4 Algorithm | en_US |
dc.subject | Key Schedule Algorithm | en_US |
dc.subject | Stream Ciphers | en_US |
dc.subject | Information Security | en_US |
dc.title | ANALYSIS AND IMPLEMENTATION OF RC4 ALGORITHM FOR STREAM CIPHERS | en_US |
dc.type | Other | en_US |
Appears in Collections: | MASTERS' THESES (CSE) |
Files in This Item:
File | Description | Size | Format | |
---|---|---|---|---|
G29132.pdf | 730.55 kB | Adobe PDF | View/Open |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.