Global Information Lookup Global Information

Stream cipher information


The operation of the keystream generator in A5/1, an LFSR-based stream cipher used to encrypt mobile phone conversations.

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the ciphertext stream. Since encryption of each digit is dependent on the current state of the cipher, it is also known as state cipher. In practice, a digit is typically a bit and the combining operation is an exclusive-or (XOR).

The pseudorandom keystream is typically generated serially from a random seed value using digital shift registers. The seed value serves as the cryptographic key for decrypting the ciphertext stream. Stream ciphers represent a different approach to symmetric encryption from block ciphers. Block ciphers operate on large blocks of digits with a fixed, unvarying transformation. This distinction is not always clear-cut: in some modes of operation, a block cipher primitive is used in such a way that it acts effectively as a stream cipher. Stream ciphers typically execute at a higher speed than block ciphers and have lower hardware complexity. However, stream ciphers can be susceptible to security breaches (see stream cipher attacks); for example, when the same starting state (seed) is used twice.

and 23 Related for: Stream cipher information

Request time (Page generated in 0.8192 seconds.)

Stream cipher

Last Update:

stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher,...

Word Count : 2217

Stream cipher attacks

Last Update:

Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly[citation...

Word Count : 1029

Block cipher mode of operation

Last Update:

that do not require padding because they effectively use a block cipher as a stream cipher. Historically, encryption modes have been studied extensively...

Word Count : 5878

Cipher

Last Update:

In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a...

Word Count : 2043

Lorenz cipher

Last Update:

The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II. They were developed by C. Lorenz...

Word Count : 3764

RC4

Last Update:

In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher. While it is remarkable for its...

Word Count : 5058

Cryptography

Last Update:

known until June 1976. Symmetric key ciphers are implemented as either block ciphers or stream ciphers. A block cipher enciphers input in blocks of plaintext...

Word Count : 10726

Initialization vector

Last Update:

ciphertext. In stream cipher encryption uniqueness is crucially important as plaintext may be trivially recovered otherwise. Example: Stream ciphers encrypt...

Word Count : 1779

Block cipher

Last Update:

cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called blocks. Block ciphers are the elementary building...

Word Count : 6475

ZUC stream cipher

Last Update:

ZUC is a stream cipher included in the Long Term Evolution standards used in 3GPP specifications for confidentiality and integrity . It is named after...

Word Count : 115

XOR cipher

Last Update:

In cryptography, the simple XOR cipher is a type of additive cipher, an encryption algorithm that operates according to the principles: A ⊕ {\displaystyle...

Word Count : 1033

Ciphertext

Last Update:

block ciphers or stream ciphers. Block ciphers operate on fixed-length groups of bits, called blocks, with an unvarying transformation. Stream ciphers encrypt...

Word Count : 1139

Common Scrambling Algorithm

Last Update:

distinct ciphers: a block cipher and a stream cipher. When used in encryption mode the data are first encrypted using the 64-bit block cipher in CBC mode...

Word Count : 1222

Cipher suite

Last Update:

A cipher suite is a set of algorithms that help secure a network connection. Suites typically use Transport Layer Security (TLS) or its deprecated predecessor...

Word Count : 2358

Salsa20

Last Update:

ChaCha are stream ciphers developed by Daniel J. Bernstein. Salsa20, the original cipher, was designed in 2005, then later submitted to the eSTREAM European...

Word Count : 3563

Caesar cipher

Last Update:

In cryptography, a Caesar cipher, also known as Caesar's cipher, the shift cipher, Caesar's code, or Caesar shift, is one of the simplest and most widely...

Word Count : 2029

Gilbert Vernam

Last Update:

additive polyalphabetic stream cipher and later co-invented an automated one-time pad cipher. Vernam proposed a teleprinter cipher in which a previously...

Word Count : 908

Encryption

Last Update:

Side-channel attacks. For example, RC4, a stream cipher, was cracked due to inherent biases and vulnerabilities in the cipher. In the context of cryptography,...

Word Count : 3607

Advanced Systems Format

Last Update:

block cipher, a custom block cipher, RC4 stream cipher and the SHA-1 hashing function. ASF container-based media are sometimes still streamed on the...

Word Count : 718

Pigpen cipher

Last Update:

pigpen cipher (alternatively referred to as the masonic cipher, Freemason's cipher, Rosicrucian cipher, Napoleon cipher, and tic-tac-toe cipher) is a geometric...

Word Count : 1226

Enigma machine

Last Update:

The Enigma machine is a cipher device developed and used in the early- to mid-20th century to protect commercial, diplomatic, and military communication...

Word Count : 11271

BEAR and LION ciphers

Last Update:

The BEAR and LION block ciphers were invented by Ross Anderson and Eli Biham by combining a stream cipher and a cryptographic hash function. The algorithms...

Word Count : 218

Feistel cipher

Last Update:

cryptography, a Feistel cipher (also known as Luby–Rackoff block cipher) is a symmetric structure used in the construction of block ciphers, named after the...

Word Count : 1316

PDF Search Engine © AllGlobal.net