Research Article | Open Access | Download PDF
Volume 73 | Issue 2 | Year 2025 | Article Id. IJETT-V73I2P119 | DOI : https://doi.org/10.14445/22315381/IJETT-V73I2P119
Key Generation Algorithm based on Array Element Substitution
Juraev G.U, Bozorov Asqar, Sindorov Davlatbek, Salimov Sirojiddin
Received | Revised | Accepted | Published |
---|---|---|---|
13 Nov 2024 | 16 Jan 2025 | 04 Feb 2025 | 21 Feb 2025 |
Citation :
Juraev G.U, Bozorov Asqar, Sindorov Davlatbek, Salimov Sirojiddin, "Key Generation Algorithm based on Array Element Substitution," International Journal of Engineering Trends and Technology (IJETT), vol. 73, no. 2, pp. 224-229, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I2P119
Abstract
In this article, using a 128-bit key, 264 A stream coding algorithm has been developed that is easy to implement in software, allowing random bit sequences to be generated up to the bit length, i.e. the key stream. This algorithm is similar to and simpler than the RC4 algorithm, which retains its security, speed, and flexibility features without using an initialization vector. The pseudorandom sequences generated by this algorithm meet National Institute of Standards and Technology (NIST) requirements for randomness.
Keywords
Stream cipher, RC4, Spritz, Array, NIST, Randomness, KSA, PRNG, Key generation.
References
[1] Deni Anggara, “Design of Encryption Application on Sound Files Using Spritz Algorithm,” Journal of Information System Research (JOSH), vol. 1, no. 3, pp. 103-108, 2020.
[Google Scholar] [Publisher Link]
[2] Ronald L. Rivest, and Jacob C. N. Schuldt, Spritz---A Spongy RC4-Like Stream Cipher and Hash Function, Paper 2016/856: Cryptology ePrint Archive, pp. 1-32, 2016.
[Google Scholar] [Publisher Link]
[3] Pouyan Seperdad et al., “A Tornado Attack on RC4 with Applications to WEP and WPA,” Paper 2015/254: Cryptology ePrint Archive, pp. 1-65, 2015.
[Google Scholar] [Publisher Link]
[4] P. Prasithsangaree, and P Krishnamurthy, “Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs,” GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), San Francisco, CA, USA, vol. 3, pp. 1445-1449, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Lin Jiao, Yonglin Hao, and Dengguo, “Stream Cipher Designs: A Review,” Science China Information Sciences, vol. 63, 2020.
[CrossRef] [Google Scholar] [Publisher Link]