A combination of hill cipher and RC4 methods for text security

A Azanuddin, R Kartadie, F Erwis… - TELKOMNIKA …, 2024 - telkomnika.uad.ac.id
To hide confidential messages from people who are not responsible or who can access the
messages, a way is needed to hide the messages. One way to hide messages in …

Modification of RC4 algorithm utilizing the two-state table and initial state factorial

A Aminudin, I Nuryasin - AIP Conference Proceedings, 2022 - pubs.aip.org
The issue of security and privacy has gained interest in the area of data and information. The
inevitable occurrence of threats, both inside and outside, hovers the security and confidence …

[PDF][PDF] A research study: usage of rc4 stream cipher in SSL configurations of web servers used by Sri Lankan financial institutes

TDB Weerasinghe, C Disanayake - Int. J. Cyber Secur. Digit …, 2018 - researchgate.net
The security of the Internet is mainly based on Secure Socket Layer (SSL) or its successor
Transport Layer Security (TLS). To secure the on-line transactions, the organizations widely …

Implementation of RC4 cryptography algorithm for data file security

AF Doni, OAH Maria, S Hanif - Journal of Physics: Conference …, 2020 - iopscience.iop.org
Communication in the digital age plays an important role, a person can carry out various
transactions or exchange data practically and quickly. So as to pose a great risk to …

Implementasi Web Service pada Perusahaan Logistik menggunakan JSON Web Token dan Algoritma Kriptografi RC4,“

MR Royani, A Wibowo - JURNAL RESTI (Rekayasa …, 2020 - garuda.kemdikbud.go.id
The development of e-commerce in Indonesia in the last five years has significantly
increased the growth for logistics service companies. The Indonesian Logistics and …

[PDF][PDF] RSA and RC4 Cryptosystem Performance Evaluation Using Image and Text File

AA Okedola, YN Asafe - Int J Sci Eng Res, 2015 - academia.edu
The process of transforming plaintext data into cipher text in order to conceal its meaning in
case it fall to hand of unauthorized recipient is refers to as encryption. The systems that …

The misuse of RC4 in Microsoft Word and Excel

H Wu - Cryptology ePrint Archive, 2005 - eprint.iacr.org
In this report, we point out a serious security flaw in Microsoft Word and Excel. The stream
cipher RC4 with key length up to 128 bits is used in Microsoft Word and Excel to protect the …

Data Security In Cloud Computing Using RC6 Encryption and Steganography Algorithms

S Aguru, BM Rao - International Journal of Scientific Research in …, 2019 - sdbindex.com
Cloud computing is one of the emerging technologies. The cloud environment is a large
open distributed system. Cloud Computing provides various services to the customers with …

Electronic Archive Design With RC4 Cryptographic Based File Security

I Satriadi, A Rahman - Journal of Computer Networks …, 2024 - jurnal.itscience.org
The transformation of archival document storage systems is starting to shift from physical
formats that require a lot of space and storage equipment to the electronic or digital realm …

[PDF][PDF] A High Throughput Algorithm for Data Encryption

A Rathika, P Nair, P Nair - International Journal of Computer …, 2011 - academia.edu
ABSTRACT RC4 encryption algorithm [3, 12, 16] was examined based on the text to be
encrypted and the chosen key. It is a symmetric key algorithm and uses stream cipher ie …