ABSTRACT
Abstract. In this paper, we implement and evaluate an efficient RC4 stream cipher, called key-pooled RC4, to transfer securely multimedia files in the wireless mobile network. In key-pooled RC4, a 1MB-sized key stream pool, which consists of 2048 or 8192, or 32768 key stream frames, is created uniquely for each client device in the registration step. When a client requests a multimedia file, the server delivers the file after encrypting it using the sequence of key stream frames which are randomly selected from the corresponding key stream pool. Our experimental results show that the proposed scheme is more time efficient than the normal RC4. Moreover, the key-pooled RC4 scheme is more secure than normal RC4.
- B. Schneier, Applied Cryptography. John Wiley & Sons, 1996.Google Scholar
- K. Naik and D. Wei, "Software implementation strategies for power-conscious systems," in Mobile Networks abd Applications, 2001. Google ScholarDigital Library
- P. Prasithsangaree and P. Krishnamurthy, "Analysis of energy consumption of rc4 and aes algorithms in wireless lans," in OLOBECOM 2003, 2003.Google Scholar
- C. T. Hager, S. F. Midkiff, J.-M. Park, and T. L. Martin, "Performance and energy efficiency of block ciphers in personal digital assistants," in the 3rd IEEE Intl Conf. on Pervasive Computing and Communications, 2005. Google ScholarDigital Library
- D. S. Wong, H. H. Fuentes, and A. H. Chan, "The performance measurement of cryptographic primitives on palm devices," in the 17th Annual Computer Security Applications Conference, 2001. Google ScholarDigital Library
- N. Potlapally, "Optimizing public-key encryption for wireless clients," in the International Conference on Communications (ICC), 2002.Google Scholar
- R. Karri and P. Mishra, "Optimizing the energy consumed by secure wireless sessions. wireless transport layer security case study," in the Mobile Networks and Applications, 2003. Google ScholarDigital Library
- N. Ruangchaijatupon and P. Krishnamurthy, "Encryption and power consumption in wireless lans," in the 3rd IEEEWorkshop on Wireless LANs, 2001.Google Scholar
- S. Fluher, I. Mantin, and A. Shamir, "Weakness in the key scheduling algorithm of rc4," in the Eighth Annual Workshop on Selected Areas in Cryptography, 2001. Google ScholarDigital Library
- DRM Specification V2.0. Open Mobile Alliance Ltd, 2004.Google Scholar
- J. Cheng, C. N. Chong, J. Doumen, S. Etalle, P. Hartel, and S. Nikolaus, "Streamto: Streaming content using a tamper-resistant token," in the Conf. on Security and Privacy in the Age of Ubiquitous Computing, 2005.Google Scholar
Index Terms
- An efficient implementation of RC4 cipher for encrypting multimedia files on mobile devices
Recommendations
Security Analysis of the RC4+ Stream Cipher
Proceedings of the 14th International Conference on Progress in Cryptology INDOCRYPT 2013 - Volume 8250The RC4+ stream cipher was proposed by Maitra and Paul at Indocrypt 2008. The authors had claimed that RC4+ ironed out most of the weaknesses of the alleged RC4 stream cipher and was only marginally slower than RC4 in software. In this paper we show ...
Revisiting RC4 key collision: Faster search algorithm and new 22-byte colliding key pairs
If two different secret keys of stream cipher RC4 yield the same internal state after the key scheduling algorithm (KSA) and hence generate the same sequence of keystream bits, they are called a colliding key pair. The number of possible internal states ...
Attacks on the RC4 stream cipher
In this article we present some weaknesses in the RC4 cipher and their cryptographic applications. Especially we improve the attack described by Fluhrer, Mantin, Shamir (In: Selected Areas in Cryptography, 2001) in such a way, that it will work, if the ...
Comments