作者
Ethar Abdul Wahhab Hachim, Thekra Abbas, Methaq Talib Gaata
发表日期
2022/11/8
研讨会论文
2022 International Conference on Information Technology Systems and Innovation (ICITSI)
页码范围
295-299
出版商
IEEE
简介
The rapid growth of digital technologies that depending on cloud computing has seriously increased the threats related to information security. This will certainly pose a major threat to the trust of users of the cloud environment. For this reason, the use of algorithms like Rivest Ciphers 4 (RC4) algorithms to encrypt data and then store in the cloud became essential issue. So, because of the simplicity and ease of RC4 algorithm and its suitability to encrypt most data form efficiently, it has been widely used. But, the RC4 algorithm suffers from some weaknesses in both of Key Schedule Algorithm (KSA) and Pseudo-Random Generation Algorithm (PRGA) stages. As, the intruder may be able to follow the traces and thus retrieve the key based on the internal state or the stream of output. There were a lot of modifications in many literature reviews to improve the security and performance of the RC4 algorithm. In this paper …
引用总数
学术搜索中的文章
EAW Hachim, T Abbas, MT Gaata - … Conference on Information Technology Systems and …, 2022