A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48)

Ali Movaghar, Mohsen HajSalehi Sichani

2009

Abstract

This paper combines the cryptanalysis of RC4 and Data mining algorithm. It analyzes RC4 by Data mining algorithm (J48) for the first time and discloses more vulnerabilities of RC4. The motivation for this paper is combining Artificial Intelligence and Machine learning with cryptography to decrypt cyphertext in the shortest possible time. This analysis shows that lots of numbers in RC4 during different permutations and substitutions do not change their positions and are fixed in their places. This means KSA and PRGA are bad shuffle algorithms. In this method, the information theory and Decision trees are used which are very powerful for solving hard problems and extracting information from data. The results of this Data mining approach could be used to improve the existing methods of breaking WEP (or other encryption algorithms) in less time with fewer packets.

Download


Paper Citation


in Harvard Style

Movaghar A. and HajSalehi Sichani M. (2009). A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48) . In Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009) ISBN 978-989-674-005-4, pages 213-218. DOI: 10.5220/0002183602130218

in Bibtex Style

@conference{secrypt09,
author={Ali Movaghar and Mohsen HajSalehi Sichani},
title={A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48)},
booktitle={Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)},
year={2009},
pages={213-218},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002183602130218},
isbn={978-989-674-005-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the International Conference on Security and Cryptography - Volume 1: SECRYPT, (ICETE 2009)
TI - A NEW ANALYSIS OF RC4 - A Data Mining Approach (J48)
SN - 978-989-674-005-4
AU - Movaghar A.
AU - HajSalehi Sichani M.
PY - 2009
SP - 213
EP - 218
DO - 10.5220/0002183602130218