Mini Project Report - Format
Mini Project Report - Format
Project Title :
Lab Supervisor :
Reg. No
Mark split up
1
RC4 ENCRYPTION AND DECRYPTION
OBJECTIVE
ABSTRACT
RC4 is a stream cipher designed in 1987 by Ron Rivest for RSA Security. It is a variable key
size stream cipher with byte-oriented operations. The algorithm is based on the use of a
random permutation. Analysis shows that the period of the cipher is overwhelming likely to
be greater than [ROBS95a]. Eight to sixteen machine operations are required per output byte,
and the cipher can be expected to run very quickly in software. RC4 is used in the Secure
Sockets Layer/Transport Layer Security (SSL/TLS) standards that have been defined for
communication between Web browsers and servers. It is also used in the Wired Equivalent
Privacy (WEP) protocol and the newer WiFi Protected Access (WPA) protocol that are part
of the IEEE 802.11 wireless LAN standard. RC4 was kept as a trade secret by RSA Security.
In September 1994, the RC4 algorithm was anonymously posted on the Internet on the
Cypherpunks anonymous remailers list.
INTRODUCTION
The RC4 algorithm is remarkably simple and quite easy to explain. A variable-length key of
from 1 to 256 bytes (8 to 2048 bits) is used to initialize a 256-byte state vector S, with
elements. At all times, contains a permutation of all 8-bit numbers from 0 through 255. For
encryption and decryption, a byte is generated from S by selecting one of the 255 entries in a
systematic fashion. As each value of is generated, the entries in S are once again permuted.
SOFTARE REQUIREMENT:
Jupyter Notebook
Python 3
2
APPROACH/METHODOLOGY:
RC4 is a symmetric stream cipher and variable key length algorithm. This
symmetric key algorithm is used identically for encryption and decryption such that
the data stream is simply XORed with the generated key sequence. The algorithm is
serial as it requires successive exchanges of state entries based on the key
sequence. The algorithm works in two phases:
K is a temporary array if the length of the key is 256 bytes copy it to K else
after copying the remaining positions of K are filled with repeated Key
Values until full.
for i = 0 to 255
S[i] = i
4
5
SIMUALTIONS RESULTS/OUTPUTS:
CONCLUSIONS
REFERENCES
6
APPENDIX
GROUP PHOTO : Take a GEOTAG group photo of your batch with working model and
paste at the end of the report (Try to take the group photo in college lab)