  <?xml version="1.0"?>
<journal>
 <journal_metadata>
  <full_title>Journal of Cybersecurity and Information Management</full_title>
  <abbrev_title>JCIM</abbrev_title>
  <issn media_type="print">2690-6775</issn>
  <issn media_type="electronic">2769-7851</issn>
  <doi_data>
   <doi>10.54216/JCIM</doi>
   <resource>https://www.americaspg.com/journals/show/2747</resource>
  </doi_data>
 </journal_metadata>
 <journal_issue>
  <publication_date media_type="print">
   <year>2019</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2019</year>
  </publication_date>
 </journal_issue>
 <journal_article publication_type="full_text">
  <titles>
   <title>Discovering Unknown Non-Consecutive Double Byte Biases in RC4 Stream Cipher Algorithm</title>
  </titles>
  <contributors>
   <organization sequence="first" contributor_role="author">University Of Anbar, College Of Computer Sciences and Information Technology, Anbar, Ramadi, 31001, IRAQ</organization>
   <person_name sequence="first" contributor_role="author">
    <given_name>Sura</given_name>
    <surname>Sura</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">University Of Anbar, College Of Computer Sciences and Information Technology, Anbar, Ramadi, 31001, IRAQ</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Rihab</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">University Of Anbar, Center for Continuing Education, Anbar, Ramadi, 31001, IRAQ</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>AbdulRahman Kareem</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">University Of Anbar, College Of Islamic Sciences, Anbar, Ramadi, 31001, IRAQ</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Nadia</given_name>
    <surname>Mohammed</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">University Of Anbar, College Of Computer Sciences and Information Technology, Anbar, Ramadi, 31001, IRAQ</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Yaqeen</given_name>
    <surname>..</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">University Of Anbar, College Of Computer Sciences and Information Technology, Anbar, Ramadi, 31001, IRAQ</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ali</given_name>
    <surname>Makki</surname>
   </person_name>
   <organization sequence="first" contributor_role="author">King Abdulaziz University, KAU, Jeddah, 22233, SAUDI ARABIA</organization>
   <person_name sequence="additional" contributor_role="author">
    <given_name>Ibrahiem El</given_name>
    <surname>Emary</surname>
   </person_name>
  </contributors>
  <jats:abstract xml:lang="en">
   <jats:p>RC4 is one of the most widely used stream cipher algorithms. It is fast, easy and suitable for hardware and software. It is used in various applications, but it has a weakness in the distribution of generated key bytes. The first few bytes of Pseudo-Random Generation Algorithm (PRGA) key stream are biased or attached to some private key bytes and thus the analysis of key stream bytes makes it potential to attack RC4, and there is connection between the key stream bytes that make it weak and breakable by single- and double-byte biases attack. This work shows the analysis of RC4 key stream based on its non-consecutive double byte biases by using newly designed algorithm that calculates the bias in a standard time (seconds). The results are shown that the bias of RC4 keystream is proved and got the same results that were shown in the literature with less time and discover a set of new non-consecutive double byte biases in the positions (i) and (i+n). The analysis of 256 positions is required additional requirements such as supercomputer and the message passing interface environment that are not available in Iraq, therefore; the analysis is done for 32 positions.</jats:p>
  </jats:abstract>
  <publication_date media_type="print">
   <year>2024</year>
  </publication_date>
  <publication_date media_type="online">
   <year>2024</year>
  </publication_date>
  <pages>
   <first_page>75</first_page>
   <last_page>83</last_page>
  </pages>
  <doi_data>
   <doi>10.54216/JCIM.130206</doi>
   <resource>https://www.americaspg.com/articleinfo/2/show/2747</resource>
  </doi_data>
 </journal_article>
</journal>
