Document Type : Research Paper


1 Collage of Computer Science and Information Technology, University of Basrah, Basrah, Iraq.

2 Department of Computer Sciences, University of Technology, Baghdad, Iraq.


Rivest Cipher 4 (RC4) is one of most common stream cipher, but it experience many problem, such as, there is little combination between the plaintext and cipher-text. For this reason RC4 Cipher is vulnerable to a number of attacks. Thereupon, this paper proposes a new modification of the RC4 to strong it. This achieved by modifying key-stream generator based on linear equation with four state tables for generating random numbers. Key control is used for selecting one state table to apply # operation, then performing forward and backward effects to generate the key-stream that used in encryption and decryption. Being evaluated, the results obtained from the statistical probabilities prove that our proposed algorithm is more complex than the standard algorithm by using different key lengths. Also, our proposed RC4 pass the randomness in most metrics in NIST


[1] S. V. Swathi, P. M. Lahari and B. A .Thomas, “Encryption algorithms: a survey,” International Journal of Advanced Research in Computer Science & Technology, Vol. 4, No.2, pp. 81-88, 2016.
[2] A. Mousa and A. Hamad, “Evaluation of the RC4 algorithm for data encryption,” international journal of computer science and application, Vol. 3, No.2, pp.44-56, June 2006.
[3] William Stallings, “Cryptography and network security: Principles and practice,” Pearson Education/Prentice Hall, 5th Edition, 2011.
[4] S. S. Gupta, “Analysis and implementation of RC4 stream cipher,” Ph.D. thesis presented to Indian Statistical Institute, Kolkata, West Bengal, India, 2013.
[5] P. Jindal and B. Singh, “RC4 encryption-a literature survey,” International Conference on Information and Communication Technologies (ICICT 2014), 2015.
[6] I. Sumartono, A. P. U. Siahaan and N. Mayasari, “An overview of the RC4 algorithm,” IOSR Journal of Computer Engineering (IOSR-JCE), Vol. 18, No. 6, pp.67-73, 2016.
[7] I. Mantin and A. Shamir, “A practical attack on broadcast RC4,” In: 8th international workshop, FSE, pp. 152–164, 2002.
[8] H. Bahjat, A. S. Rahma, “Proposed new quantum cryptography system using quantum description techniques for generated curves,” The 2009 international conference on security and management, SAM2009, 13-16 2009, LasVegas, USA, SAM 2009.
[9] P. Pardeep and P.K. Pateriya “PC-RC4 algorithm: an enhancement over standard RC4 algorithm,” International Journal of Computer Science and Network (IJCSN), Vo. 1, No. 3, pp.1-6, 2012
[10] A. S. Rahma and Z. .M.Hussein, “Modified RC4 dual key algorithm based on irreducible polynomial,” International Journal of Emerging Trends & Technology in Computer Science (IJETTCS), Vol. 4, No. 2, 2015.
[11] S. H. Hashem and A. B. Jasim, “A proposed modification on RC4 algorithm by increasing its randomness,” Journal of Al Rafidain University College, Vol. 1, No.39, 2016.
[12] M. M. Hammood, K. Yoshigoe, and A.M. Sagheer, “RC4 stream cipher with a random initial state,” In: Proceedings of 10th FTRA international conference on secure and trust computing, data management, and applications (STA’13). Lecture notes in electrical engineering, Springer, Heidelberg, 2013.
[13] M. K. Pehlivanoğlu and N. Duru, “Email encryption using RC4 algorithm,” International Journal of Computer Applications (0975 – 8887), Vol.130, No.14, 2015.
[14] S. Kadry and M. Smaili, “An improvement of RC4 cipher using vigenère cipher,” International Journal of Computational Intelligence and Information Security, Vo. 1, No. 3, 2010.
[15] J. Talbot and D. Welsh, “Complexity and cryptography an introduction,” Cambridge University Press, 2006.