Key Generation Algorithm based on Array Element Substitution
Key Generation Algorithm based on Array Element Substitution |
||
![]() |
![]() |
|
© 2025 by IJETT Journal | ||
Volume-73 Issue-2 |
||
Year of Publication : 2025 | ||
Author : Juraev G.U, Bozorov Asqar, Sindorov Davlatbek, Salimov Sirojiddin |
||
DOI : 10.14445/22315381/IJETT-V73I2P119 |
How to Cite?
Juraev G.U, Bozorov Asqar, Sindorov Davlatbek, Salimov Sirojiddin, "Key Generation Algorithm based on Array Element Substitution," International Journal of Engineering Trends and Technology, vol. 73, no. 2, pp. 224-229, 2025. Crossref, https://doi.org/10.14445/22315381/IJETT-V73I2P119
Abstract
In this article, using a 128-bit key, 264 A stream coding algorithm has been developed that is easy to implement in software, allowing random bit sequences to be generated up to the bit length, i.e. the key stream. This algorithm is similar to and simpler than the RC4 algorithm, which retains its security, speed, and flexibility features without using an initialization vector. The pseudorandom sequences generated by this algorithm meet National Institute of Standards and Technology (NIST) requirements for randomness.
Keywords
Stream cipher, RC4, Spritz, Array, NIST, Randomness, KSA, PRNG, Key generation.
References
[1] Deni Anggara, “Design of Encryption Application on Sound Files Using Spritz Algorithm,” Journal of Information System Research (JOSH), vol. 1, no. 3, pp. 103-108, 2020.
[Google Scholar] [Publisher Link]
[2] Ronald L. Rivest, and Jacob C. N. Schuldt, Spritz---A Spongy RC4-Like Stream Cipher and Hash Function, Paper 2016/856: Cryptology ePrint Archive, pp. 1-32, 2016.
[Google Scholar] [Publisher Link]
[3] Pouyan Seperdad et al., “A Tornado Attack on RC4 with Applications to WEP and WPA,” Paper 2015/254: Cryptology ePrint Archive, pp. 1-65, 2015.
[Google Scholar] [Publisher Link]
[4] P. Prasithsangaree, and P Krishnamurthy, “Analysis of Energy Consumption of RC4 and AES Algorithms in Wireless LANs,” GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489), San Francisco, CA, USA, vol. 3, pp. 1445-1449, 2003.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Lin Jiao, Yonglin Hao, and Dengguo, “Stream Cipher Designs: A Review,” Science China Information Sciences, vol. 63, 2020.
[CrossRef] [Google Scholar] [Publisher Link]