An Obfuscated Implementation of RC4

Because of its simplicity, ease of implementation, and speed, RC4 is one of the most widely used software oriented stream ciphers. It is used in several popular protocols such as SSL and it has also been integrated into many applications and software such as Microsoft Windows, Lotus Notes, Oracle Secure SQL and Skype.

[1]  Hallie McClung Workman Formation of safe spaces in gendered online communities [electronic resource] : reddit and "the front page of the internet" / , 2014 .

[2]  Paul C. van Oorschot,et al.  White-Box Cryptography and an AES Implementation , 2002, Selected Areas in Cryptography.

[3]  Atsuko Miyaji,et al.  Software Obfuscation on a Theoretical Basis and Its Implementation , 2003, IEICE Transactions on Fundamentals of Electronics Communications and Computer Sciences.

[4]  Jack W. Davidson,et al.  Software Tamper Resistance: Obstructing Static Analysis of Programs , 2000 .

[5]  Aggelos Kiayias,et al.  Polynomial Reconstruction Based Cryptography , 2001, Selected Areas in Cryptography.

[6]  Christian S. Collberg,et al.  Surreptitious Software - Obfuscation, Watermarking, and Tamperproofing for Software Protection , 2009, Addison-Wesley Software Security Series.

[7]  Paul C. van Oorschot,et al.  A White-Box DES Implementation for DRM Applications , 2002, Digital Rights Management Workshop.

[8]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[9]  Jules Desharnais,et al.  Static Detection of Malicious Code in Executable Programs , 2000 .

[10]  Hamilton E. Link,et al.  Clarifying Obfuscation: Improving the Security of White-Box Encoding , 2004, IACR Cryptol. ePrint Arch..

[11]  Clark Thomborson,et al.  Manufacturing cheap, resilient, and stealthy opaque constructs , 1998, POPL '98.

[12]  Fei-Yue Wang,et al.  Obfuscate arrays by homomorphic functions , 2006, 2006 IEEE International Conference on Granular Computing.

[13]  Hamilton E. Link,et al.  Clarifying obfuscation: improving the security of white-box DES , 2005, International Conference on Information Technology: Coding and Computing (ITCC'05) - Volume II.

[14]  P. Biondi,et al.  Silver Needle in the Skype , 2006 .

[15]  Okyeon Yi,et al.  Methods for practical whitebox cryptography , 2010, 2010 International Conference on Information and Communication Technology Convergence (ICTC).

[16]  Christian S. Collberg,et al.  A Taxonomy of Obfuscating Transformations , 1997 .