Crypto U4, Stream Cipher

Description

IYM002 (Unit 4 - Symmetric Crypto) Note on Crypto U4, Stream Cipher, created by jjanesko on 01/04/2013.
jjanesko
Note by jjanesko, updated more than 1 year ago
jjanesko
Created by jjanesko about 11 years ago
229
11

Resource summary

Page 1

Encryption: Uses a key that is usually shorter than the plaintext. Keystream generator takes key and uses a mathematical process to generate a pseudorandom stream of bits called the keystream. Keystream bits are XOR'd with the plaintext bits to give a resulting ciphertext. Keystream generators are deterministic generators.

Decryption:The receiver XOR's the ciphertext bits with the plaintext stream bits.

Key Management Compared to OTP, the key is easier to manage. The keystream is pseudorandomly generated which is simpler than OTP (where the key is randomly generated). You should never reuse the same bits of a keystream. To avoid this, you can use different parts of a keystream to encrypt a message (reusing the same key). tend to be adopted in high security apps in closed networking environments

Properties (positive) no error propagation ideal where communication has to go over channels of poor quality fast because built on XOR on-the-fly-encryption - data spends the least amount of time as plaintext

Properties (negative) need for synchronization between sender and receiver need procedures for resynchronization:  time based, based on special communication,  many are proprietary less versatile than block ciphers... only used for encryption

New Page

Show full summary Hide full summary

Similar

Crypto U4, Block Cipher, Cipher Feedback Mode (CFB)
jjanesko
Crypto U4, Block Cipher, Cipher Block Chaining Mode (CBC)
jjanesko
Crypto U4, Block Cipher, Counter Mode
jjanesko
Crypto U4, Block Cipher, Electronic Codebook Mode (ECB)
jjanesko
Crypto: U3 & U4 Flashcards (by Mohamed Ahmed Enab)
jjanesko
Crypto U3, Theoretical vs. Practical Security
jjanesko
Crypto U1, Basic Principles
jjanesko
Crypto U2, Crypto design principles
jjanesko
Crypto U9, Cryptographic Protocols
jjanesko
Crypto U10 (part 1), Key Management & Lifecycle
jjanesko
Crypto U8, example dynamic password scheme
jjanesko