Email Encryption Using RC4 Algorithm
Email Encryption Using RC4 Algorithm
net/publication/284206699
CITATIONS READS
4 934
2 authors:
All content following this page was uploaded by Meltem Kurt Pehlivanoğlu on 20 January 2016.
25
International Journal of Computer Applications (0975 – 8887)
Volume 130 – No.14, November 2015
2. RC4 ALGORITHM
There are two basic cryptographic algorithms; these are
symmetric algorithms and asymmetric algorithms.
Cryptographic protocols use cryptography, is sequences of
actions, which are concern two or more sides, designed to
fulfill a goal. A stream cipher is a symmetric algorithm that
has two types called as synchronous stream cipher and self-
synchronizing stream cipher.
The RC4 is a stream cipher, as mentioned before it used lots
of standards and protocols for example in the SSL/TLS
standards that have been defined for communication between
Web browsers and servers. It also used in WEP protocol and
WPA protocol.
It works in two phases, key setup and ciphering. Both phases
must be performed for every new key. During an l-bit key
setup (l is the key length) the encryption key is used to
generate an encrypting variable using two arrays, state and
key, and l-number of mixing operations [2].
The algorithm is based on the use of random permutation. The
key stream is completely independent of the plaintext used.
The algorithm uses a variable length key from 1 to 256 bytes
to initialize a 256-byte array. The array is used for subsequent
generation of pseudo-random bytes and then generates a
pseudorandom stream, which is XORed with the
plaintext/ciphertext to give the ciphertext/plaintext [14].
As S = {0, 1, 2 … N-1} is the initial permutation, two parts of
RC4 algorithm which are Key Scheduling Algorithm and
Pseudo Random Generation Algorithm, their pseudo codes are
given in Table 1.
Table 1. Pseudo Code for RC4 Algorithm
Key Scheduling Pseudo Random Generation
Algorithm (K) Algorithm
Initialization: Initialization:
for i= 0 to N-1 i= 0
S[i] = i j= 0
T[i]= K[i mod l ] Fig 2: Pseudo Code for MRC4 KSA [19]
Scrambling: Generation Loop:
j=0 while (true)
for i= 0 to N-1 i= (i + 1) mod l
j= (j + S[i] + T[i]) j= (j + S[i]) mod l
mod l swap (S[i], S[j])
swap (S[i], S[j]) output = S[S[i]+S[j] mod l]
end
26
International Journal of Computer Applications (0975 – 8887)
Volume 130 – No.14, November 2015
End
4. IMPROVED METHOD
Proposed method in this paper has four classes. These are Fig 6: The encryption process of each block with MRC4
newmessage, default, messages and MRC4. C++ algorithm
programming language is used.
This system allows to user the selection of between 64-128 bit
The newmessage class composes new Email packages and key while encryption with MRC4.
then Email subject and content is encrypted using encrypt
method in the MRC4 class. In the default class, POP3 and
SMTP servers' session information is registered. Then this
registration information is direct to the messages class. In the
messages class connects to the POP3 server, encrypted Email
is decrypted with decrypt method in MRC4 class.
27
International Journal of Computer Applications (0975 – 8887)
Volume 130 – No.14, November 2015
Start
5. CONCLUSION
Asymmetric and symmetric encryption algorithms provide
security, data integrity, and authentication. Symmetric
encryption algorithms use the same cryptographic keys for
encryption and decryption process. RC4 encryption algorithm
is so widely used for secure communication. In this paper
modified version MRC4 is used for secure messaging. Thanks
to this implementation people can control their Emails and
they can encrypt it while sending to the recipient.
Fig 8: The decryption process of each block with MRC4 In the future different encryption algorithms can be used and
algorithm their advantages and disadvantages are comparing.
Technological improvements have made mobile
communication mandatory. In the future this
implementation can be integrated on mobile phones for secure
messaging.
6. REFERENCES
[1] Koblitz, N.1994. A course in Number theory and
Cryptography.
[2] Schneier, B. 1996. Applied Cryptography - Protocols,
Algorithms and Source Code in C.
[3] Jain, Y. K. and Gosavi, P. B. 2008. Email Security using
Encryption and Compression. Computational Intelligence
Fig 9: Login screen for Modelling Control & Automation International
Conference.
In the Fig. 9 login screen is given, SMTP and POP3 server
names are entered to this screen. Using Email sending screen [4] Guo, Z. and Okuyama, T. Finley, M. R. 2005. A New
that is given in the Fig. 10, people can sent encrypted Email to Trust Model for PKI Interoperability. Autonomic and
the recipient side. Autonomous Systems and International Conference on
Networking and Services.
28
International Journal of Computer Applications (0975 – 8887)
Volume 130 – No.14, November 2015
[5] Rivest, R., Shamir, A., and Adleman, L. 1978. A Method Improve Email Privacy. Ninth International Conference
for Obtaining Digital Signatures and Public Key on Availability, Reliability and Security (ARES).
Cryptosystems. Communications of the ACM.
[13] Ojamaa, A. and Lind, U. R. 2013. Securing Customer
[6] Lu, C. and Geva, S. 2005. Secure email-based peer to Email Communication in E-Commerce. Sixth
peer information retrieval. International Conference on International Conference on Developments in eSystems
Cyberworlds (CW’05). Engineering.
[7] Chen, T. Ma, S. 2008. A Secure Email Encryption Proxy [14] Kitsos, P., Kostopoulos, G., Sklavos, N., and
Based on Identity-based Cryptography. International Koufopavlou, O. 2004. Hardware İmplementation of
Conference on MultiMedia and Information Technology. The RC4 Stream Cipher. IEEE 1363.
[8] Li, C. J., Dinghu, Q., Haifeng, Y., Hao, Z., and Nie, M. [15] Klein, A. 2008. Attacks on the RC4 stream cipher,
2011. Email Encryption System Based On Hybrid Aes Designs, Codes and Cryptography. Springer- Verlag.
And Ecc. IET International Communication Conference
on Wireless Mobile and Computing (CCWMC). [16] Mantin, A. and Shamir. 2001. A Practical Attack on
Broadcast RC4, FSE. LectureNotes in Computer Science
[9] Madi, N. K. M., Salehian, S., Masoumiyan, F., and SpringerVerlag.
Abdullah, F. 2012. Implementation of Secure Email
Server in Cloud Environment. International Conference [17] Mantin, A. 2005. Practical Attack on the Fixed RC4 in
on Computer and Communication Engineering (ICCCE). the WEP Mod. 11th International Conference on the
Theory and Application of Cryptology and Information
[10] Choukse, D., Singh, U. K., Laddhani, L., and Security (ASIACRYPT).
Shahapurkar, R. 2012. Designing Secure Email
Infrastructure. Ninth International Conference on [18] Fiuhrer, S., Mantin, A. and Shamir. 2001. Weaknesses in
Wireless and Optical Communications Networks the key scheduling algorithm of RC4. 8th Annual
(WOCN). International Workshop (SAC).
[11] Yeh, J. H., Zeng, F., and Long, T. 2014. P2P email [19] Jindal, P. and Singh, B. 2014. Performance Analysis of
encryption by an identity-based one-way group key Modified RC4 Encryption Algorithm. IEEE International
agreement protocol. Parallel and Distributed Systems Conference on Recent Advances and Innovations in
(ICPADS). Engineering (ICRAIE).
[12] Dacosta, I., Put, A., and De Decker, B. 2014. [20] Yao, Y., Chong, J., and Xingwei, W. 2010. Enhancing
EmailCloak: A Practical and Flexible Approach to RC4 algorithm for WLAN WEP Protocol. 2010 Chinese
Control and Decision Conference
IJCATM : www.ijcaonline.org 29