RC4 GGHN Cryptography Algorithm for Message Security

Shahira An-nissa


Cryptography is a technique that is generally used in security in the process of exchanging information in the form of text messages, picture messages, or others involving two or more users. There are many types and classifications of cryptography developed to date that are able to provide security for the information sent. Modern cryptography that is popular and widely used is the Rivest Cipher (RC4) algorithm. RC4 cryptography is a type of stream cipher, which processes units or input data at one time. This research will use a combination of several message character lengths, namely 50, 100, 250, 500, 1000, 2500, 5000, 10000 characters, and tested using several key lengths, namely 5, 10, 25, 50, 100 characters. from testing with message length parameters and keys then the results will be compiled into a table and described into an image for easy understanding. Research results show it can be concluded that the length of the key used in encryption does not significantly affect the effectiveness of the system processing time. In addition, the length of the text has a big influence in determining the length of the system process in encrypting and decrypting messages. the more the number of characters that will be sent, the higher the processing time required to perform the security process once using the RC4 GGHN cryptography algorithm


GGHN, Cryptography, Encryption, Decryption, Key Length, Messages

Full Text:



D. R. I. M. Setiadi, E. H. Rachmawanto, C. A. Sari, A. Susanto, and M. Doheir, “A Comparative Study of Image Cryptographic Method,” Proc. - 2018 5th Int. Conf. Inf. Technol. Comput. Electr. Eng. ICITACEE 2018, pp. 336–341, 2018, doi: 10.1109/ICITACEE.2018.8576907.

M. A. Budiman, Amalia, and N. I. Chayanie, “An Implementation of RC4+ Algorithm and Zig-zag Algorithm in a Super Encryption Scheme for Text Security,” J. Phys. Conf. Ser., vol. 978, no. 1, 2018, doi: 10.1088/1742-6596/978/1/012086.

R. Saha, G. Geetha, G. Kumar, T. H. Kim, and W. J. Buchanan, “MRC4: A Modified RC4 Algorithm Using Symmetric Random Function Generator for Improved Cryptographic Features,” IEEE Access, vol. 7, pp. 172045–172054, 2019, doi: 10.1109/ACCESS.2019.2956160.

A. Khalid, G. Paul, and A. Chattopadhyay, “RC4-AccSuite: A Hardware Acceleration Suite for RC4-Like Stream Ciphers,” IEEE Trans. Very Large Scale Integr. Syst., vol. 25, no. 3, pp. 1072–1084, 2017, doi: 10.1109/TVLSI.2016.2606554.

D. E. Sari, H. N. N. Muchsin, D. R. I. M. Setiadi, C. A. Sari, and E. H. Rachmawanto, “Hybrid Encryption Technique using Cyclic Bit Shift and RC4,” in 2019 4th International Conference on Information Technology, Information Systems and Electrical Engineering (ICITISEE), Nov. 2019, pp. 205–209, doi: 10.1109/ICITISEE48480.2019.9003848.

N. Hayati, “Implementasi Algoritma RC4A dan MD5 untuk Menjamin Confidentiality dan Integrity pada File Teks,” J. Penelit. Tek. Inform., vol. 1, no. April, pp. 51–57, 2017.

R. A. Mollin, An introduction to cryptography, second edition, 2nd Editio. New York: Chapman and Hall/CRC, 2006.

M. A. Orumiehchiha, J. Pieprzyk, E. Shakour, and R. Steinfeld, “Cryptanalysis of RC4(n, m) stream cipher,” SIN 2013 - Proc. 6th Int. Conf. Secur. Inf. Networks, vol. 4, pp. 165–172, 2013, doi: 10.1145/2523514.2523615.

G. Gong, K. C. Gupta, M. Hell, and Y. Nawaz, “Towards a General RC4-Like Keystream Generator,” vol. 2, 2005, pp. 162–174.

A. Kircanski, R. Al-Zaidy, and A. M. Youssef, “A new distinguishing and key recovery attack on NGG stream cipher,” Cryptogr. Commun., vol. 1, no. 2, pp. 269–282, 2009, doi: 10.1007/s12095-009-0012-4.

F. Akbar, H. Mawengkang, and S. Efendi, “Comparative analysis of RC4+ algorithm, RC4 NGG algorithm and RC4 GGHN algorithm on image file security,” IOP Conf. Ser. Mater. Sci. Eng., vol. 420, no. 1, 2018, doi: 10.1088/1757-899X/420/1/012131.

E. J. Madarro-capó, C. M. Legón-pérez, and O. Rojas, “applied sciences Measuring Avalanche Properties on RC4 Stream Cipher Variants,” 2021.

B. Subhadeep, “Some Studies on Selected Stream Ciphers . Analysis , Fault Attack & Related Results by Subhadeep Banik,” (Doctoral Diss. Indian Stat. Institute, Kolkata), no. February, 2015.

B. Mondal, N. Sinha, and T. Mandal, “A secure image encryption algorithm using LFSR and RC4 key stream generator,” Smart Innov. Syst. Technol., vol. 43, pp. 227–237, 2016, doi: 10.1007/978-81-322-2538-6_24.

A. Khalid, G. Paul, and A. Chattopadhyay, “Study of Flexibility,” 2019, pp. 127–168.

D. J. Bernstein and S. Chatterjee, Progress in Cryptology – INDOCRYPT 2011, Vol 7107., vol. 7107. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011.

DOI: https://doi.org/10.30743/infotekjar.v6i2.4531


  • There are currently no refbacks.

Copyright (c) 2022 Shahira An-nissa

Creative Commons License
This work is licensed under a Creative Commons Attribution 4.0 International License.

InfoTekJar (Jurnal Nasional Informatika dan Teknologi Jaringan)

Program Studi Teknik Informatika - Universitas Islam Sumatera Utara
Website : http://jurnal.uisu.ac.id/index.php/infotekjar/index
Email : infotekjar@ft.uisu.ac.id

InfoTekJar : Jurnal Nasional Informatika dan Teknologi Jaringan) is licensed under a Creative Commons Attribution 4.0 International License