1
RC4 Algorithm :
 RC4 is a Stream cipher designed in 1987 by Ron Rivets for RSA Security.
 It is variable key –size stream cipher with byte-oriented operations.
 The algorithm is based on the use of random permutation.
o K- is Key
o S- S is State vector having plain text.
INITIALIZATION OF S :
To begin,the entriesof Sare setequal tothe valuesfrom0 through255 in ascendingorder;that
is, S[0] 0, S[1] 1, . . ., S[255] 255.
A temporary vector,T, is also created.
If the length of the key K is 256 bytes, then K is transferred to T. Otherwise, for a key of length
keylenbytes,the firstkeylenelements of T are copied from K, and then K is repeated as many times as
necessary to fill out T.These preliminary operations can be summarized as:
Figure 1 Initialization of S
Initial Permutation of S:
Nextwe use T to produce the initial permutationof S.Thisinvolvesstarting with S[0] and going through
to S[255] and, foreach S[i],swappingS[i]with another byte in S according to a scheme dictated by T[i]:
STREAM GENERATION: Once the S vector is initialized, the input key is no longer used. Stream
generationinvolvescyclingthroughall the elementsof S[i] and,foreachS[i],swappingS[i] with another
byte in S according to a scheme dictated by the current configuration of S. After S[255] is reached, the
process continues, starting over again at S[0]:
2
BLOWFISH:
BLOWFISH isa symmetricblockcipherdevelopedbyBruce Schneier.BLOWFISH wasdesignedtohave
the followingcharacteristics:
Fast: Blowfishencryptsdataon 32 bit microprocessorsata rate of 18 clock cyclesperbyte.
Compact:Blowfishcanrun inlessthan5K of memory.
Simple:Blowfish’ssimple structure iseasytoimplementandeasesthe taskof determiningthe strength
of the algorithm.
3
Variable secure:The keylengthisvariable andcanbe as longas 448 bits.Thisallowsa tradeoff between
higherspeedandhighersecurity.
Subkeyand S-Box Generation:
Blowfishmakesuse of akeythat rangesfrom32 bitsto 448 bits( 1 to 14 32 bitwords).
Keyisusedto generate 18 sub keyseachof 32 bitsandfour 8*32 S-boxes.
The keysare storedinK-array:
4
5
IDEA (INTERNATIONAL DATA ENCRYPTION ALGORITHM):
6
Keygenerationanduse of subkeys:
The processcontinuesforrestof the rounds.(Look additional informationforbetterclarification)
OperationsusedinEverysingle round:
1. Multiplication
2. Addition
3.Bitwise XOROperator
7
8
ADDITIONAL INFORMATIONFOR BETTER UNDAERSTANDING OF ALGORITHM
What happensin each single round:
9

More Related Content

PDF
Solidity Tutorials- Transer/Send ether- Transfer(), send(), call() function i...
PDF
A698111855 22750 26_2018_finite
PPTX
Sketch root locus
PPTX
Lecture02
PPT
2.4 mst prim’s algorithm
PPT
Chapter 8 Root Locus Techniques
PDF
MOBILE COMPUTING
DOCX
Micro processor programs
Solidity Tutorials- Transer/Send ether- Transfer(), send(), call() function i...
A698111855 22750 26_2018_finite
Sketch root locus
Lecture02
2.4 mst prim’s algorithm
Chapter 8 Root Locus Techniques
MOBILE COMPUTING
Micro processor programs

Viewers also liked (8)

PPTX
Crime Analytics: Analysis of crimes through news paper articles
PPTX
Crime Pattern Detection using K-Means Clustering
PPT
Using Data Mining Techniques to Analyze Crime Pattern
DOC
3. el ejercicio y deporte en ninos y adolescentes (1)
PPTX
Peinados p&m para ti
PPTX
Angelo bersani il mediatore agenzia immobiliare
PDF
Newsletter 2017 - Febrero
PPTX
La alimentación humana
Crime Analytics: Analysis of crimes through news paper articles
Crime Pattern Detection using K-Means Clustering
Using Data Mining Techniques to Analyze Crime Pattern
3. el ejercicio y deporte en ninos y adolescentes (1)
Peinados p&m para ti
Angelo bersani il mediatore agenzia immobiliare
Newsletter 2017 - Febrero
La alimentación humana
Ad

Similar to Rc4 blowfish idea (20)

PPTX
Topic20 The RC4 Algorithm.pptx
PDF
IJEIR_1615
PDF
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
PDF
“Optimized AES Algorithm Core Using FeedBack Architecture”
PPTX
Streamcipher its about stream ciphers we learnt it in class
PDF
Crack wep-wifi-under100seconds (copied)
PDF
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
PPTX
Block Ciphers and the data encryption standard.pptx
PDF
chap3.pdf
PPTX
Block ciphers & public key cryptography
PPT
WiFi Security Explained
PPT
RC4&RC5
PPTX
information security(Feistal Cipher)
PDF
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text
PDF
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
PPTX
PPTX
Block Cipher.cryptography_miu_year5.pptx
PPTX
Unit 2
Topic20 The RC4 Algorithm.pptx
IJEIR_1615
Paper on Optimized AES Algorithm Core Using FeedBack Architecture
“Optimized AES Algorithm Core Using FeedBack Architecture”
Streamcipher its about stream ciphers we learnt it in class
Crack wep-wifi-under100seconds (copied)
Using Cipher Key to Generate Dynamic S-Box in AES Cipher System
Block Ciphers and the data encryption standard.pptx
chap3.pdf
Block ciphers & public key cryptography
WiFi Security Explained
RC4&RC5
information security(Feistal Cipher)
Randomization Based Block Cipher with Key Mapped S-Box SelectionFull Text
RANDOMIZATION-BASED BLOCK CIPHER WITH KEY-MAPPED S-BOX SELECTION
Block Cipher.cryptography_miu_year5.pptx
Unit 2
Ad

Recently uploaded (20)

PDF
20250617 - IR - Global Guide for HR - 51 pages.pdf
PPTX
PRASUNET_20240614003_231416_0000[1].pptx
PPTX
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
PDF
Introduction to Power System StabilityPS
PPTX
Management Information system : MIS-e-Business Systems.pptx
PDF
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
PDF
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
PPTX
Feature types and data preprocessing steps
PPTX
ai_satellite_crop_management_20250815030350.pptx
PPTX
Principal presentation for NAAC (1).pptx
PPTX
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
PDF
Cryptography and Network Security-Module-I.pdf
PPTX
Software Engineering and software moduleing
PPTX
Module 8- Technological and Communication Skills.pptx
PPTX
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
PPTX
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
PPTX
mechattonicsand iotwith sensor and actuator
PPTX
CyberSecurity Mobile and Wireless Devices
PDF
distributed database system" (DDBS) is often used to refer to both the distri...
PPTX
Amdahl’s law is explained in the above power point presentations
20250617 - IR - Global Guide for HR - 51 pages.pdf
PRASUNET_20240614003_231416_0000[1].pptx
CN_Unite_1 AI&DS ENGGERING SPPU PUNE UNIVERSITY
Introduction to Power System StabilityPS
Management Information system : MIS-e-Business Systems.pptx
UEFA_Carbon_Footprint_Calculator_Methology_2.0.pdf
LOW POWER CLASS AB SI POWER AMPLIFIER FOR WIRELESS MEDICAL SENSOR NETWORK
Feature types and data preprocessing steps
ai_satellite_crop_management_20250815030350.pptx
Principal presentation for NAAC (1).pptx
Sorting and Hashing in Data Structures with Algorithms, Techniques, Implement...
Cryptography and Network Security-Module-I.pdf
Software Engineering and software moduleing
Module 8- Technological and Communication Skills.pptx
Chemical Technological Processes, Feasibility Study and Chemical Process Indu...
Chapter 2 -Technology and Enginerring Materials + Composites.pptx
mechattonicsand iotwith sensor and actuator
CyberSecurity Mobile and Wireless Devices
distributed database system" (DDBS) is often used to refer to both the distri...
Amdahl’s law is explained in the above power point presentations

Rc4 blowfish idea

  • 1. 1 RC4 Algorithm :  RC4 is a Stream cipher designed in 1987 by Ron Rivets for RSA Security.  It is variable key –size stream cipher with byte-oriented operations.  The algorithm is based on the use of random permutation. o K- is Key o S- S is State vector having plain text. INITIALIZATION OF S : To begin,the entriesof Sare setequal tothe valuesfrom0 through255 in ascendingorder;that is, S[0] 0, S[1] 1, . . ., S[255] 255. A temporary vector,T, is also created. If the length of the key K is 256 bytes, then K is transferred to T. Otherwise, for a key of length keylenbytes,the firstkeylenelements of T are copied from K, and then K is repeated as many times as necessary to fill out T.These preliminary operations can be summarized as: Figure 1 Initialization of S Initial Permutation of S: Nextwe use T to produce the initial permutationof S.Thisinvolvesstarting with S[0] and going through to S[255] and, foreach S[i],swappingS[i]with another byte in S according to a scheme dictated by T[i]: STREAM GENERATION: Once the S vector is initialized, the input key is no longer used. Stream generationinvolvescyclingthroughall the elementsof S[i] and,foreachS[i],swappingS[i] with another byte in S according to a scheme dictated by the current configuration of S. After S[255] is reached, the process continues, starting over again at S[0]:
  • 2. 2 BLOWFISH: BLOWFISH isa symmetricblockcipherdevelopedbyBruce Schneier.BLOWFISH wasdesignedtohave the followingcharacteristics: Fast: Blowfishencryptsdataon 32 bit microprocessorsata rate of 18 clock cyclesperbyte. Compact:Blowfishcanrun inlessthan5K of memory. Simple:Blowfish’ssimple structure iseasytoimplementandeasesthe taskof determiningthe strength of the algorithm.
  • 3. 3 Variable secure:The keylengthisvariable andcanbe as longas 448 bits.Thisallowsa tradeoff between higherspeedandhighersecurity. Subkeyand S-Box Generation: Blowfishmakesuse of akeythat rangesfrom32 bitsto 448 bits( 1 to 14 32 bitwords). Keyisusedto generate 18 sub keyseachof 32 bitsandfour 8*32 S-boxes. The keysare storedinK-array:
  • 4. 4
  • 5. 5 IDEA (INTERNATIONAL DATA ENCRYPTION ALGORITHM):
  • 6. 6 Keygenerationanduse of subkeys: The processcontinuesforrestof the rounds.(Look additional informationforbetterclarification) OperationsusedinEverysingle round: 1. Multiplication 2. Addition 3.Bitwise XOROperator
  • 7. 7
  • 8. 8 ADDITIONAL INFORMATIONFOR BETTER UNDAERSTANDING OF ALGORITHM What happensin each single round:
  • 9. 9