sir,
I am doing project on cryptography RC4 algorithm.
Kindly help me to implement the same in MATLAB.
Posts: 14,118
Threads: 61
Joined: Oct 2014
Abstract - Encryption algorithms play a vital role in information
security systems. The study discovers the progress of Encryption
algorithms in terms of their diversity of applications. Some of the
Encryption algorithms have been developed to make transmission
and storage of data more secured and confidential. Different levels
of securities are offered by different algorithms depending on how
difficult is to break them. If it is difficult to recover the plain text in
spite of having substantial amount of cipher text then an algorithm
is unconditionally secured. This study provides evaluation of eight
of the most common encryption algorithms namely: DES, 3DES,
AES (Rijndael), Blowfish, RSA, RC2, RC4, and RC6. From our
analysis we came to conclusion that the best algorithm is the one
which fulfills our need of security and speed. We come with new
design of encryption algorithm based on AES or RSA or RC4,
various scripts on NS2 or MATLAB or SCILAB, simulation
environment of encrypted wireless network based on NS2 or
MATLAB or SCILAB. We will implement newly proposed
encryption algorithm on simulated environment and also test
performance of proposed algorithm on wireless simulated network.
We come with design and implement technique to store encrypted
data on secondary storage device.
Keywords - Algorithm, cryptography, Cipher, Encryption, Network
Security
I. INTRODUCTION
Cryptography usually referred as "the study of secret", presently
is attached to the definition of encryption. Encryption is the
process of encoding information with the use of an encryption
key in a way that third parties cannot read the encoded
information. The encoded information is termed as
unreadable ciphertext.
The importance of encrypting data is more pertinent in light of
the mushrooming applications and globalization of
communication. It is an indispensable for applications like
email, electronic transactions, digital cash, and so on.
Data encryption procedure are classified on the type of security
keys used for encrypt/decrypt the data. The categories are:
Symmetric encryption and Asymmetric encryption techniques.