[Cryptography] Made a modification to RC4
Ryan Carboni
ryacko at gmail.com
Sat Aug 30 04:17:05 EDT 2014
Feed RC4 through a transposition cipher... essentially a single round
2048-bit block cipher.
S1: 256 permuted bytes, serves as the PRGA
S2: 256 permuted bytes, serves as the transposition cipher
S3: 256 empty values, serves as the output array
S4: 256 empty values, serves as the output array to rescramble the
transposition cipher
i := 0 (S1)
j := 0 (S1)
while GeneratingOutput:
i := i + 1
j := (j + S1[i]) mod 256
swap values of S1[i] and S1[j]
K := S1[(S1[i] + S1[j]) mod 256]
output K to position S2[i] in S3
XOR K and S4[i]
if i = 255
output S3
while i > 0
swap values of S2[i] and S2[S4[i]]
i := i - 1
endwhile
This should flatten the biases in the first 256 bytes of RC4. It should
also reduce the relationship between byte values and the internal state.
I call this XARC4.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20140830/cdb911d4/attachment.html>
More information about the cryptography
mailing list