RC4 Cryptography Implementation Analysis on Text Data

Agung Susilo Yuda Irawan, Adi Rizky Pratama, Ryan Antono
{"title":"RC4 Cryptography Implementation Analysis on Text Data","authors":"Agung Susilo Yuda Irawan, Adi Rizky Pratama, Ryan Antono","doi":"10.38101/SISFOTEK.V11I2.408","DOIUrl":null,"url":null,"abstract":"Security and confidentiality have become very important and continue to grow. In recent years, there have been several cases involving data security, such as the leaking of Facebook user account information. This is certainly a significant issue in the world of information technology and even the world of entrepreneurship because it involves one of the young entrepreneurs, Mark Zuckerberg. Main problem in this case is data security. who can know information and who should not know information. To overcome such things, research is made in the field of data and information security by analyzing one of the encryption and decryption techniques, namely RC4 cryptography. This study explains how RC4 cryptography works, the advantages and disadvantages of RC4 cryptography, and the effectiveness of RC4 cryptography. RC4 (River Ciper 4) is a decryption encryption technique that uses a key as a reference. The process consists of KSA, PRGA, and XOR. To find out the usefulness of RC4 cryptography, in this study, encryption and decryption were carried out on text data. There are several advantages and disadvantages to RC4 cryptography from a technical point of view. The advantage that needs to be underlined is that this RC4 cryptography uses a certain key as a reference, things like this can provide convenience to the encryption maker but can also be a threat. as a result RC4 can hide information very well while the secret key is not known by others. In addition to being used in text data, this cryptography may be used for other data such as audio and video.","PeriodicalId":378682,"journal":{"name":"JURNAL SISFOTEK GLOBAL","volume":"3 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-09-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"JURNAL SISFOTEK GLOBAL","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.38101/SISFOTEK.V11I2.408","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

Abstract

Security and confidentiality have become very important and continue to grow. In recent years, there have been several cases involving data security, such as the leaking of Facebook user account information. This is certainly a significant issue in the world of information technology and even the world of entrepreneurship because it involves one of the young entrepreneurs, Mark Zuckerberg. Main problem in this case is data security. who can know information and who should not know information. To overcome such things, research is made in the field of data and information security by analyzing one of the encryption and decryption techniques, namely RC4 cryptography. This study explains how RC4 cryptography works, the advantages and disadvantages of RC4 cryptography, and the effectiveness of RC4 cryptography. RC4 (River Ciper 4) is a decryption encryption technique that uses a key as a reference. The process consists of KSA, PRGA, and XOR. To find out the usefulness of RC4 cryptography, in this study, encryption and decryption were carried out on text data. There are several advantages and disadvantages to RC4 cryptography from a technical point of view. The advantage that needs to be underlined is that this RC4 cryptography uses a certain key as a reference, things like this can provide convenience to the encryption maker but can also be a threat. as a result RC4 can hide information very well while the secret key is not known by others. In addition to being used in text data, this cryptography may be used for other data such as audio and video.
文本数据的RC4加密实现分析
安全和保密已经变得非常重要,而且还在继续增长。近年来,发生了多起涉及数据安全的案件,比如Facebook用户账户信息泄露事件。在信息技术领域,甚至在创业领域,这无疑是一个重要的问题,因为它涉及到一位年轻的企业家,马克·扎克伯格。这种情况下的主要问题是数据安全。谁能知道,谁不应该知道。为了克服这些问题,在数据和信息安全领域进行了研究,通过分析其中一种加解密技术,即RC4加密技术。本研究解释了RC4加密的工作原理、RC4加密的优缺点以及RC4加密的有效性。RC4 (River Ciper 4)是一种使用密钥作为参考的解密加密技术。该过程由KSA、PRGA和XOR组成。为了验证RC4加密技术的实用性,本研究对文本数据进行了加密和解密。从技术角度来看,RC4加密有几个优点和缺点。需要强调的优点是,RC4加密使用特定的密钥作为参考,这样的事情可以为加密制造商提供方便,但也可能是一种威胁。因此,RC4可以很好地隐藏信息,而密钥不为其他人所知。除了用于文本数据之外,这种加密还可以用于其他数据,例如音频和视频。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
自引率
0.00%
发文量
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信