RC4 GGHN Cryptography Algorithm for Message Security
Abstract
Keywords
Full Text:
PDFReferences
D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, A. Susanto, and M. Doheir, “A Comparative Study of Image Cryptographic Method,” Proc. - 2018 5th Int. Conf. Inf. Technol. Comput. Electr. Eng. ICITACEE 2018, pp. 336–341, 2018, doi: 10.1109/ICITACEE.2018.8576907.
M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” J. Phys. Conf. Ser., vol. 978, no. 1, 2018, doi: 10.1088/1742-6596/978/1/012086.
R. Saha, G. Geetha, G. Kumar, T. H. Kim, and W. J. Buchanan, “MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features,” IEEE Access, vol. 7, pp. 172045–172054, 2019, doi: 10.1109/ACCESS.2019.2956160.
A. Khalid, G. Paul, and A. Chattopadhyay, “RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers,” IEEE Trans. Very Large Scale Integr. Syst., vol. 25, no. 3, pp. 1072–1084, 2017, doi: 10.1109/TVLSI.2016.2606554.
D. E. Sari, H. N. N. Muchsin, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, “Hybrid Encryption Technique using Cyclic Bit Shift and RC4,” in 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Nov. 2019, pp. 205–209, doi: 10.1109/ICITISEE48480.2019.9003848.
N. Hayati, “Implementasi Algoritma RC4A dan MD5 untuk Menjamin Confidentiality dan Integrity pada File Teks,” J. Penelit. Tek. Inform., vol. 1, no. April, pp. 51–57, 2017.
R. A. Mollin, An introduction to cryptography, second edition, 2nd Editio. New York: Chapman and Hall/CRC, 2006.
M. A. Orumiehchiha, J. Pieprzyk, E. Shakour, and R. Steinfeld, “Cryptanalysis of RC4(n, m) stream cipher,” SIN 2013 - Proc. 6th Int. Conf. Secur. Inf. Networks, vol. 4, pp. 165–172, 2013, doi: 10.1145/2523514.2523615.
G. Gong, K. C. Gupta, M. Hell, and Y. Nawaz, “Towards a General RC4-Like Keystream Generator,” vol. 2, 2005, pp. 162–174.
A. Kircanski, R. Al-Zaidy, and A. M. Youssef, “A new distinguishing and key recovery attack on NGG stream cipher,” Cryptogr. Commun., vol. 1, no. 2, pp. 269–282, 2009, doi: 10.1007/s12095-009-0012-4.
F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4+ algorithm, RC4 NGG algorithm and RC4 GGHN algorithm on image file security,” IOP Conf. Ser. Mater. Sci. Eng., vol. 420, no. 1, 2018, doi: 10.1088/1757-899X/420/1/012131.
E. J. Madarro-capó, C. M. Legón-pérez, and O. Rojas, “applied sciences Measuring Avalanche Properties on RC4 Stream Cipher Variants,” 2021.
B. Subhadeep, “Some Studies on Selected Stream Ciphers . Analysis , Fault Attack & Related Results by Subhadeep Banik,” (Doctoral Diss. Indian Stat. Institute, Kolkata), no. February, 2015.
B. Mondal, N. Sinha, and T. Mandal, “A secure image encryption algorithm using LFSR and RC4 key stream generator,” Smart Innov. Syst. Technol., vol. 43, pp. 227–237, 2016, doi: 10.1007/978-81-322-2538-6_24.
A. Khalid, G. Paul, and A. Chattopadhyay, “Study of Flexibility,” 2019, pp. 127–168.
D. J. Bernstein and S. Chatterjee, Progress in Cryptology – INDOCRYPT 2011, Vol 7107., vol. 7107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.
DOI: https://doi.org/10.30743/infotekjar.v6i2.4531
Refbacks
- There are currently no refbacks.
Copyright (c) 2022 Shahira An-nissa

This work is licensed under a Creative Commons Attribution 4.0 International License.
InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan)
Program Studi Teknik Informatika - Universitas Islam Sumatera Utara
Website : http://jurnal.uisu.ac.id/index.php/infotekjar/index
Email : infotekjar@ft.uisu.ac.id
InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan) is licensed under a Creative Commons Attribution 4.0 International License