Novel Hardware Implementation of Modified RC4 Stream Cipher for Wireless Network Security

This paper presents novel hardware implementation of modified RC4 stream cipher for wireless network security. The Modified RC4 algorithm proposes two changes in conventional RC4 stream cipher algorithm, one in Key Scheduling Algorithm (KSA) stage and other in Pseudorandom Generation Algorithm (PRGA) stage. This modification in KSA removed many weakness and produces random states, so that it will hard to identify any nonuniformity in the permutation after KSA. The other modification in PRGA has destroyed relation between internal states of S-boxes, which is base of many attacks on RC4. The proposed architecture uses variable key length from 1 byte to (256+256+8) 520 bytes but previous designs support maximum key length of 256 bytes. This architecture achieved throughput of 63.449 Mbps at a clock frequency of 190.349 MHz independent of key length. The system was implemented in hardware by using VHDL language and Xilinx FPGA device. General Terms Stream ciphers for wireless network security.

[1]  Sultan Weatherspoon,et al.  Overview of IEEE 802.11b Security , 2000 .

[2]  Timo Hämäläinen,et al.  Security design for a new wireless local area network TUTWLAN , 1998, Ninth IEEE International Symposium on Personal, Indoor and Mobile Radio Communications (Cat. No.98TH8361).

[3]  O. Koufopavlou,et al.  Hardware implementation of the RC4 stream cipher , 2003, 2003 46th Midwest Symposium on Circuits and Systems.

[4]  Michael Hassan Fundamentals of Digital Logic Design with VHDL , 2013 .

[5]  Panu Hämäläinen,et al.  Hardware implementation of the improved WEP and RC4 encryption algorithms for wireless terminals , 2000, 2000 10th European Signal Processing Conference.

[6]  Bruce Schneier,et al.  Fast Software Encryption: Designing Encryption Algorithms for Optimal Software Speed on the Intel Pentium Processor , 1997, FSE.

[7]  Douglas A. Pucknell,et al.  Basic VLSI Design , 1987 .

[8]  Jian Xie,et al.  An improved RC4 stream cipher , 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010).

[9]  Goutam Paul,et al.  Analysis of RC4 and Proposal of Additional Layers for Better Security Margin , 2008, IACR Cryptol. ePrint Arch..

[10]  Alfred Menezes,et al.  Handbook of Applied Cryptography , 2018 .

[11]  Wolfgang Henseler,et al.  Digital Design , 2003 .

[12]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[13]  Bernard P. Zajac Applied cryptography: Protocols, algorithms, and source code in C , 1994 .

[14]  Giuseppe Di Battista,et al.  26 Computer Networks , 2004 .