2021
DOI: 10.11591/ijeecs.v24.i1.pp452-463
|View full text |Cite
|
Sign up to set email alerts
|

The security of RC4 algorithm using keys generation depending on user's retina

Abstract: Digital technologies grow more rapidly; information security threats are becoming increasingly dangerous. Advanced and various cyber-attacks and security threats, like targeted emails, and information exploitation, pose a critical threat that basically undermines our trust in the digital society. Rivest cipher 4 (RC4) algorithm is a significant cipher of a stream that could be utilized with protocols of the internet, the advantage of the RC4 algorithm is that it is simple and effective. There are several weak,… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 19 publications
0
3
0
Order By: Relevance
“…The CTR-DRBG algorithm, widely used for secure random number generation, faces several inherent issues [38]- [40]. Firstly, in the derivation function, generating secure random numbers using the counter value leads to increased computational time as the counter starts at 0 and increments, causing a significant rise in computation time with larger counter values [41]. Particularly, the necessity to reset upon each counter value change consumes time during operations.…”
Section: Problemsmentioning
confidence: 99%
“…The CTR-DRBG algorithm, widely used for secure random number generation, faces several inherent issues [38]- [40]. Firstly, in the derivation function, generating secure random numbers using the counter value leads to increased computational time as the counter starts at 0 and increments, causing a significant rise in computation time with larger counter values [41]. Particularly, the necessity to reset upon each counter value change consumes time during operations.…”
Section: Problemsmentioning
confidence: 99%
“…Mazher and Waleed [16] Retina features extracted using glowworm swarm optimization algorithm Chaotic map used for high-quality random cryptographic key generation GSO algorithm extracts retina features for random key generation. Salih and Mahdawi [17] Proposed RC4-Retina algorithm based on user's retina. Introduced retina key scheduling algorithm (RKSA) for key generation.…”
Section: Reference Description Performancementioning
confidence: 99%
“…Retinal biometric features offer high precision due to their stability over a lifetime [20]. Previous work, such as Tajuddin and Nandini [15], Mazher and Waleed [16], Salih and Mahdawi [17], Alrifaee and Ismaeel [18], has demonstrated the use of retinal biometric data for cryptographic key generation and key management, leveraging the uniqueness and stability of the retinal blood vessel patterns. The proposed algorithms and techniques aim to enhance the security and reliability of cryptographic systems by utilizing the retinal biometric modality.…”
Section: Zhao Et Al [14]mentioning
confidence: 99%