[PDF][PDF] Evaluation of the RC4 algorithm for data encryption.

A Mousa, A Hamad - Int. J. Comput. Sci. Appl., 2006 - staff-old.najah.edu
Abstract Analysis of the effect of different parameters of the RC4 encryption algorithm where
examined. Some experimental work was performed to illustrate the performance of this …

[PDF][PDF] On the security of the RC5 encryption algorithm

BS Kaliski, YL Yin - 1998 - grc.com
The RC5 encryption algorithm was designed by Professor Ronald Rivest of MIT and first
published in December 1994 17. Since its publication, RC5 has attracted the attention of …

An overview of the RC4 algorithm

APU Siahaan - 2017 - osf.io
File security is critical in maintaining the confidentiality of the information, especially
sensitive information that should only be known by authorized persons only. If the data is not …

[PDF][PDF] A survey on symmetric and asymmetric cryptography algorithms in information security

MA Al-Shabi - International Journal of Scientific and Research …, 2019 - researchgate.net
This paper discusses several important algorithms used for the encryption and decryption of
data in all fields, to make a comparative study for most important algorithms in terms of …

[PDF][PDF] Modern encryption techniques for cloud computing

S El-etriby, EM Mohamed… - … on Communications and …, 2012 - academia.edu
Cloud computing has to become the next-generation architecture of IT Enterprise. Clouds
are massively complex systems. They can be reduced to simple primitives, that are …

On differential and linear cryptanalysis of the RC5 encryption algorithm

BS Kaliski Jr, YL Yin - Annual international cryptology conference, 1995 - Springer
This paper analyzes the security of the RC5 encryption algorithm against differential and
linear cryptanalysis. RC5 is a new block cipher recently designed by Ron Rivest. It has a …

Encryption efficiency analysis and security evaluation of RC6 block cipher for digital images

HEH Ahmed, HM Kalash… - … Conference on Electrical …, 2007 - ieeexplore.ieee.org
This paper investigates the encryption efficiency of RC6 block cipher application to digital
images, introducing a mathematical measure for encryption efficiency, which we will call the …

A timing attack on RC5

H Handschuh, HM Heys - Selected Areas in Cryptography: 5th Annual …, 1999 - Springer
This paper describes a timing attack on the RC5 block encryption algorithm. The analysis is
motivated by the possibility that some implementations of RC5 could result in the data …

The misuse of RC4 in Microsoft Word and Excel

H Wu - Cryptology ePrint Archive, 2005 - eprint.iacr.org
In this report, we point out a serious security flaw in Microsoft Word and Excel. The stream
cipher RC4 with key length up to 128 bits is used in Microsoft Word and Excel to protect the …

A review and comparative analysis of various encryption algorithms

R Bhanot, R Hans - International Journal of Security and Its Applications, 2015 - earticle.net
Now days, Data security is very challenging issue that touches many areas including
computers and communication. Recently, we came across many attacks on cyber security …