Modern encryption methods using the RC4 algorithm

Keywords: confidentiality, cybersecurity, cryptography


Nowadays, data encryption and privacy are one of the most important issues. In this article, we will look at modern encryption methods and reveal all aspects related to the relevance of use and vulnerability of the RC4 algorithm. Encryption techniques are the process of converting plaintext data into encrypted text in order to hide its value and thus prevent an unauthorized recipient from obtaining the original data. Therefore, encryption is mainly used to ensure confidentiality. Companies typically encrypt their data before transferring to make sure the data is secure during transit. Encrypted data is sent over a public network and decrypted by the recipient. Before the advent of the Internet, cryptography dealt only with encrypting messages – converting messages from intelligible to incomprehensible, making them unreadable to the person who intercepted the message, and reverse conversion by the recipient while preserving the essence of the message. In recent years, cryptography has begun to expand and, in addition to secret messaging, has begun to include methods for verifying the integrity of messages, secure communication technology, sender and recipient authentication (using keys, digital signatures, etc.), and more. This article will discuss the RC4 algorithm, also known as ARC4 or ARCFOUR – streaming cipher, which is widely used in various information security systems in computer networks (eg, SSL and TLS, wireless security algorithms WEP and WPA).


Alagic G., Alperin-Sheri J.M., Apon D.C. et al. (2019) Status report on the first round of the nistpost-quantum cryptography standardization process, NIST Interagency/Internal Report (NISTIR) 8240
Aljawarneh, S., Yassein, M.B. & Talafha, W.A. (2017) A resource-efficient encryption algorithm for multimedia big data. Multimed Tools Appl 76, 22703–22724.
Bitansky N., Vaikuntanathan V. (2018) Indistinguishability Obfuscation from Functional Encryption Journal of the ACM November Article No.: 39
Chen L., Jordan S.P., Liu Y.K. et al. (2016) Report on post-quantum cryptography, NIST Interagency/Internal Report (NISTIR) 8105.
Halunen K., Latvala O.-M., (2021) Review of the use of human senses and capabilities in cryptography, Computer Science Review 39 100340
Kai Li, Pei-Gen Yan, Qing-Yu Cai, (2021) Quantum computing and the security of public key cryptography, Fundamental Research 1 85–87
Kölbl S. (2017) Design and analysis of cryptographic algorithms: Ph.D Thesis. Lyngby
Özkaynak, F. (2018) Brief review on application of nonlinear dynamics in image encryption. Nonlinear Dyn 92, 305–313.
Roos А. (1995) A Class Of Weak Keys In The RC4 Stream Cipher 22 Sep 1995. [Електронний ресурс] – Режим доступу: URL:
Ronald L. (2005) The RC5 encryption algorithm Fast Software Encryption pp. 86-96
Schneier B. (2017) Applied Cryptography: Protocols, Algorithms and Source Code in C
Searle J. R. (1969) Speech Act. Cambridge University Press.
Thabit F., Alhomdy Sh., Abdulrazzaq H.A. Al-Ahdal, Jagtap S., (2021) A New Lightweight Cryptographic Algorithm for Enhancing Data Security In Cloud Computing, Global Transitions Proceedings.
Xiuli C., Yiran C., Lucie B. (2017) A novel chaos-based image encryption algorithm using DNA sequence operations, Optics and Lasers in Engineering, Vol. 88, Pages 197-213, ISSN 0143-8166
White S. R. (1990) Covert Distributed Processing with Computer Viruses, Advances in Cryptology CRYPTO '89 Proceedings, Springer-Verlag, 616-619.
Whitman M. & Mattord H. (2005). Principles of information security.
Wiener M. J. (1993) Efficient DES Key Search. presented at the rump session of CRYPTO '93, Aug 1993
Wiener M.J. (1994) Efficient DES Key Search, TR-244, School of Computer Science, Car leton University, May 1994.
Yongfei W., Liming Z.,Tao Q. et al. (2021) Content-adaptive image encryption with partial unwinding decomposition Signal Processing Vol. 181, April 2021, 107911
How to Cite
Petruk, M., & Stavytskyi, O. (2020). Modern encryption methods using the RC4 algorithm. Herald of Kiev Institute of Business and Technology, 45(3), 72-79.