{"title":"一种增强WEP安全性的新方法","authors":"A. Garg","doi":"10.1109/ICGCIOT.2015.7380532","DOIUrl":null,"url":null,"abstract":"This paper begins by introducing the concept of Ron's Code 4 (RC4). The introductory section gives brief information about the architecture of RC4 and its various flaws. In order to examine the RC4 security threats, this paper will look at both architectural flaws and exceptional flaws. Here, I propose a novel approach to provide additional security to the original RC4 algorithm. With the given 64 bit dynamic key of RC4 (initial vector + fixed key), we have size of the initial vector is 24 bit and size of fixed key is 40 bit. These 40 bit keys are getting changed after a specific time to protect RC4 from brute force.","PeriodicalId":400178,"journal":{"name":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","volume":"81 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2015-10-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"1","resultStr":"{\"title\":\"A novel approach to enhance security in WEP\",\"authors\":\"A. Garg\",\"doi\":\"10.1109/ICGCIOT.2015.7380532\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This paper begins by introducing the concept of Ron's Code 4 (RC4). The introductory section gives brief information about the architecture of RC4 and its various flaws. In order to examine the RC4 security threats, this paper will look at both architectural flaws and exceptional flaws. Here, I propose a novel approach to provide additional security to the original RC4 algorithm. With the given 64 bit dynamic key of RC4 (initial vector + fixed key), we have size of the initial vector is 24 bit and size of fixed key is 40 bit. These 40 bit keys are getting changed after a specific time to protect RC4 from brute force.\",\"PeriodicalId\":400178,\"journal\":{\"name\":\"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"volume\":\"81 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2015-10-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"1\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICGCIOT.2015.7380532\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2015 International Conference on Green Computing and Internet of Things (ICGCIoT)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICGCIOT.2015.7380532","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
This paper begins by introducing the concept of Ron's Code 4 (RC4). The introductory section gives brief information about the architecture of RC4 and its various flaws. In order to examine the RC4 security threats, this paper will look at both architectural flaws and exceptional flaws. Here, I propose a novel approach to provide additional security to the original RC4 algorithm. With the given 64 bit dynamic key of RC4 (initial vector + fixed key), we have size of the initial vector is 24 bit and size of fixed key is 40 bit. These 40 bit keys are getting changed after a specific time to protect RC4 from brute force.