Please use this identifier to cite or link to this item: http://localhost:8081/xmlui/handle/123456789/15304
Full metadata record
DC FieldValueLanguage
dc.contributor.authorRocky, Swagatam Roy-
dc.date.accessioned2022-02-07T05:00:22Z-
dc.date.available2022-02-07T05:00:22Z-
dc.date.issued2019-05-
dc.identifier.urihttp://localhost:8081/xmlui/handle/123456789/15304-
dc.description.abstractSince its public availability in 1994, RC4 has been extensively used for data – security measures. The specialty of RC4 lies within its formation – it is very easy to implement compared to other stream ciphers while providing excellent security. However, extensive research on the matter for more than two decades has exposed many frailties that lie within RC4 and how these frailties can be used to breach RC4. This has led to many modifications of the cipher along with the creation of various variants too. This dissertation focuses on analyzing the best of the heaps of research that has been done on RC4 since its birth and also to look into its computational efficiency compared to more modern versions of the cipher.en_US
dc.description.sponsorshipINDIAN INSTITUTE OF TECHNOLOGY, ROORKEEen_US
dc.language.isoenen_US
dc.publisherI I T ROORKEEen_US
dc.subjectRC4 Algorithmen_US
dc.subjectKey Schedule Algorithmen_US
dc.subjectStream Ciphersen_US
dc.subjectInformation Securityen_US
dc.titleANALYSIS AND IMPLEMENTATION OF RC4 ALGORITHM FOR STREAM CIPHERSen_US
dc.typeOtheren_US
Appears in Collections:MASTERS' THESES (CSE)

Files in This Item:
File Description SizeFormat 
G29132.pdf730.55 kBAdobe PDFView/Open


Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.