skip to main content
10.1145/1244002.1244256acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
Article

An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices

Published:11 March 2007Publication History

ABSTRACT

Abstract. In this paper, we implement and evaluate an efficient RC4 stream cipher, called key-pooled RC4, to transfer securely multimedia files in the wireless mobile network. In key-pooled RC4, a 1MB-sized key stream pool, which consists of 2048 or 8192, or 32768 key stream frames, is created uniquely for each client device in the registration step. When a client requests a multimedia file, the server delivers the file after encrypting it using the sequence of key stream frames which are randomly selected from the corresponding key stream pool. Our experimental results show that the proposed scheme is more time efficient than the normal RC4. Moreover, the key-pooled RC4 scheme is more secure than normal RC4.

References

  1. B. Schneier, Applied Cryptography. John Wiley & Sons, 1996.Google ScholarGoogle Scholar
  2. K. Naik and D. Wei, "Software implementation strategies for power-conscious systems," in Mobile Networks abd Applications, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. P. Prasithsangaree and P. Krishnamurthy, "Analysis of energy consumption of rc4 and aes algorithms in wireless lans," in OLOBECOM 2003, 2003.Google ScholarGoogle Scholar
  4. C. T. Hager, S. F. Midkiff, J.-M. Park, and T. L. Martin, "Performance and energy efficiency of block ciphers in personal digital assistants," in the 3rd IEEE Intl Conf. on Pervasive Computing and Communications, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. D. S. Wong, H. H. Fuentes, and A. H. Chan, "The performance measurement of cryptographic primitives on palm devices," in the 17th Annual Computer Security Applications Conference, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. N. Potlapally, "Optimizing public-key encryption for wireless clients," in the International Conference on Communications (ICC), 2002.Google ScholarGoogle Scholar
  7. R. Karri and P. Mishra, "Optimizing the energy consumed by secure wireless sessions. wireless transport layer security case study," in the Mobile Networks and Applications, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. N. Ruangchaijatupon and P. Krishnamurthy, "Encryption and power consumption in wireless lans," in the 3rd IEEEWorkshop on Wireless LANs, 2001.Google ScholarGoogle Scholar
  9. S. Fluher, I. Mantin, and A. Shamir, "Weakness in the key scheduling algorithm of rc4," in the Eighth Annual Workshop on Selected Areas in Cryptography, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. DRM Specification V2.0. Open Mobile Alliance Ltd, 2004.Google ScholarGoogle Scholar
  11. J. Cheng, C. N. Chong, J. Doumen, S. Etalle, P. Hartel, and S. Nikolaus, "Streamto: Streaming content using a tamper-resistant token," in the Conf. on Security and Privacy in the Age of Ubiquitous Computing, 2005.Google ScholarGoogle Scholar

Index Terms

  1. An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in
      • Published in

        cover image ACM Conferences
        SAC '07: Proceedings of the 2007 ACM symposium on Applied computing
        March 2007
        1688 pages
        ISBN:1595934804
        DOI:10.1145/1244002

        Copyright © 2007 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 11 March 2007

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • Article

        Acceptance Rates

        Overall Acceptance Rate1,650of6,669submissions,25%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader