Escolar Documentos
Profissional Documentos
Cultura Documentos
AES-RC4 Cryptosystem
Rucha Dhumne1 , Raj Vardhan Singh2, Suresh Salankar3
1
Mtech Research Scholar, Electronics and Communication Engineering Dept., GHRCE, Nagpur
2
Senior Design Engineer, JDMTech semiconductor PVT LTD, Nagpur
3
Professor, Department of Electronics And Communication Engineering, GHRCE, Nagpur
Abstract- Security of data is a primary need for all the recipient decrypts the message using a cryptographic
system. The AES-RC4 hybrid cryptosystem gives the decryption algorithm with match key that may or may not be
combine advantages of Advanced Encryption Standard the same as the one used by the sender.
(AES) To data encryption and decryption, to secure the Non-repudiation: Sender or receiver cannot deny a
key used for data encryption-decryption Rivest Cipher 4 transmitting/received message. The sender of a message
RC4 is used. This system is designed using the Co- cannot later claim he/she did not send it
designed approached where AES and RC4 run on the
NIOS II integrated development environment (IDE) soft-
core. The implementation is on Cyclone IV FPGA,
Rijndael algorithm program supported " NIOS II +
FPGA" are able to do better performance in the area of
latency where it comparatively uses low resources. The
results are analysed in the IDE console window of a
personal computer system.
Fig 1. Simple Cryptosystem
A cryptosystem comprises of a major unit called key unit.
A keywords-symmetric key, asymmetric key,
The key in cryptosystem plays the major role because
cryptography algorithms, hybrid cryptography without a key one cannot encrypt or decrypt a piece of data
or a string of data bytes. Keys are divided into two types
symmetric and asymmetric.
I. INTRODUCTION a) Symmetric key cryptography algorithm
b) Asymmetric key cryptography algorithm
The rise of security and safety has risen over these years
resulting in highly authentication protocols and highly secure
a) Symmetric (Secret) Key Cryptography
algorithms where a cryptographic system is a must.
In symmetric key algorithm both the sender and receiver
Cryptographic systems provide privacy to data, image or any
share the same key information and kept it secret from others
information related medium which is authenticated and needs
while in the asymmetric key algorithm the sender gets the
to reach the destination without any variations or disruptions.
public key and receiver got the private key. In terms of
The concept of cryptosystem arises at this point when the
implementation, the asymmetric key is complex yet slow in
source data is being hacked or mislead by an attacker. To
nature while symmetric is complex too with high speed. The
avoid such issues cryptographic protocols comes into the
major motive behind this project is to combine both the
picture. These systems need to be very complex and difficult
system to take the benefits of both. The important aspect of
not only from a design point of view but also from
this design is to make the most efficient and enhanced system
implementation. This is because of more the high-security
which will be used for highly authentication platforms. Both
level, fewer chances of getting hacked.
AES and RC4 are the best choice for such type of
Cryptosystems can be a single device with complex
cryptosystem when the need is high security and more
mathematical algorithms or hybrid systems with twice as
complex to decode or decrypt. In this paper, we will show the
greater complexity[1]. The main aspect or motive behind the
encryption and decryption of raw data from its original
design should be the requirement of the user. Whether it
version to back[1].
needs to protect some data or testing purpose or simulation
checker or any other security uses. In cryptosystem first plain
b) Asymmetric (public) Key Cryptography
text is converted in cipher text by encryption and then that
An asymmetric key is differing from the symmetric key
ciphertext is again converted into original plain text via
algorithm because in this sender and receiver use different
decryption process as shown in figure 1.
keys that cannot be derived from each other. A public key is
Three main requirements of cryptography are
distributed freely where the private keys are kept hidden. A
authentication, confidentiality, and non-repudiation [2].
public key used for encryption has to be shared by both
Authentication: a process in which a user has to provide
sender and recipient. A public key which is used to encrypt
their identity to another who does not have personal
the data can able to change the content in a particular way so
knowledge of their identity.
that only authorised receiver can see the original information.
Confidentiality: Confidentiality refers to keeping the
An asymmetric cryptosystem is also referred to as public key
information secret. The sender encrypts the message using a
cryptographic encryption algorithm with a suitable key. The
cryptosystems[1].
a) AES OVERVIEW