%0 Journal Article %T Exponential Brute-Force Complexity of A Permutation Based Stream Cipher %A Mohammed Omari %A Hamdy S. Soliman %J International Journal of Computer Network and Information Security %D 2013 %I MECS Publisher %X This paper introduces a permutation generation mechanism based on a shared secret key. The generated permutation vectors are used as encryption keys in a stream ciphering cryptosystem. We investigated various types of attacks on the known stream cipher RC4 and patched most of its loopholes, especially biased-byte and state-related attacks. Unique to our approach, we prove mathematically that the complexity of brute-forcing such a system is (2n), where n is the key size in bytes. This paper also presents a complete security model using permutation-based encryption, in order to handle privacy. In addition, our approach achieved higher performance than that of existing peer techniques, while maintaining solid security. Experimental results show that our system is much faster than the existing security mechanisms, such as AES and DES. %K Biased byte attack %K exponential brute force %K network security permutation vector generation %K stream cipher %U http://www.mecs-press.org/ijcnis/ijcnis-v5-n1/v5n1-1.html