This article needs additional citations for verification. Please help improve this article by adding citations to reliable sources. Unsourced material may be challenged and removed. Find sources: "Stream cipher" – news · newspapers · books · scholar · JSTOR(October 2021) (Learn how and when to remove this message)
The operation of the keystream generator in A5/1, an LFSR-based stream cipher used to encrypt mobile phone conversations.
Astream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream. Since encryption of each digit is dependent on the current state of the cipher, it is also known as state cipher. In practice, a digit is typically a bit and the combining operation is an exclusive-or (XOR).
The pseudorandom keystream is typically generated serially from a random seed value using digital shift registers. The seed value serves as the cryptographic key for decrypting the ciphertext stream. Stream ciphers represent a different approach to symmetric encryption from block ciphers. Block ciphers operate on large blocks of digits with a fixed, unvarying transformation. This distinction is not always clear-cut: in some modes of operation, a block cipher primitive is used in such a way that it acts effectively as a stream cipher. Stream ciphers typically execute at a higher speed than block ciphers and have lower hardware complexity. However, stream ciphers can be susceptible to security breaches (see stream cipher attacks); for example, when the same starting state (seed) is used twice.
Streamciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly[citation...
that do not require padding because they effectively use a block cipher as a streamcipher. Historically, encryption modes have been studied extensively...
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...
The Lorenz SZ40, SZ42a and SZ42b were German rotor streamcipher machines used by the German Army during World War II. They were developed by C. Lorenz...
In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a streamcipher. While it is remarkable for its...
known until June 1976. Symmetric key ciphers are implemented as either block ciphers or streamciphers. A block cipher enciphers input in blocks of plaintext...
ciphertext. In streamcipher encryption uniqueness is crucially important as plaintext may be trivially recovered otherwise. Example: Streamciphers encrypt...
cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary building...
ZUC is a streamcipher included in the Long Term Evolution standards used in 3GPP specifications for confidentiality and integrity . It is named after...
In cryptography, the simple XOR cipher is a type of additive cipher, an encryption algorithm that operates according to the principles: A ⊕ {\displaystyle...
block ciphers or streamciphers. Block ciphers operate on fixed-length groups of bits, called blocks, with an unvarying transformation. Streamciphers encrypt...
distinct ciphers: a block cipher and a streamcipher. When used in encryption mode the data are first encrypted using the 64-bit block cipher in CBC mode...
A cipher suite is a set of algorithms that help secure a network connection. Suites typically use Transport Layer Security (TLS) or its deprecated predecessor...
ChaCha are streamciphers developed by Daniel J. Bernstein. Salsa20, the original cipher, was designed in 2005, then later submitted to the eSTREAM European...
In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...
additive polyalphabetic streamcipher and later co-invented an automated one-time pad cipher. Vernam proposed a teleprinter cipher in which a previously...
Side-channel attacks. For example, RC4, a streamcipher, was cracked due to inherent biases and vulnerabilities in the cipher. In the context of cryptography,...
pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric...
The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...
The BEAR and LION block ciphers were invented by Ross Anderson and Eli Biham by combining a streamcipher and a cryptographic hash function. The algorithms...
cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...