stream cipher


Also found in: Wikipedia.

stream cipher

[′strēm ‚sī·fər]
(communications)
A cipher that makes use of an algorithmic procedure to produce an unending sequence of binary digits which is then combined either with plaintext to produce ciphertext or with ciphertext to recover plaintext.

stream cipher

An encryption method that works with continuous streams of input rather than fixed blocks. Bytes of plaintext go into the stream cipher, and bytes of encrypted text come out the other end. RC4 is an example of a stream cipher (see RC4). Contrast with block cipher.
References in periodicals archive ?
Abdalla introduced an algorithm that employs a shuffling procedure to perform encryption of audio files, applying the stream cipher method.
ABSTRACT: A5/1 stream cipher is a type of cryptographic algorithm which is widely used for encryption of the GSM communication.
It has a relatively simple algorithm; its compression function is a modified "double round" version of Bernstein's stream cipher "chacha" which has been intensively analyzed and found to be of excellent performance and parallelizable [3].
The platform encrypts video with a pseudo random stream cipher, and only authorized users are given the decryption key.
In 2004, based on the idea of guess-and-determine attack, Ralf-Phillip Weinmann and Kai Wirt presented an analysis on the stream cipher part of CSA(CSA-SC)[1] and the complexity of the attack is less than 245, based on their cipher representation and predicated on the state cycle structure of one of the registers during keystream generation.
It describes different types of wireless networks, including wi-fi, ZigBee, cellular mobile, ad hoc, cognitive radio, wireless mesh, and wireless sensor networks, followed by discussion of mobility, bandwidth, and node location management issues; message communication techniques and protocols in ad hoc networks; wireless local area networks; the placement of base stations in a cellular network and deployment of sensor nodes in wireless sensor networks; energy-efficient communication, with emphasis on physical, MAC (media access control), and network layers; and security aspects, including authentication, jamming, intrusion detection, and stream cipher generation.
Our scheme uses a stream cipher encryption algorithm called 2-Keys Symmetric Encryption [18] for protecting the confidentiality of data.
This paper proposes a stream cipher developed based on the following two construction principles: (i) adjustment of the construction to the asymmetric capabilities of the involved parties; (ii) employment of the results regarding binary channels with insertion errors for enhancing security.
One possibility is to use some stream cipher instead and consequently resolve the vulnerability to replay attacks.
15] Shinsaku Kiyomoto, Toshiaki Tanaka and Kouichi Sakurai "K2: A Stream Cipher Algorithm using Dynamic Feedback Control" Springer, Communications in Computer and Information Science,, Vol.
According to operational procedure, cryptographic techniques can be further classified as stream cipher and block cipher.
today announced that Enocoro a light weight stream cipher developed by Hitachi in 2007, has received final approval by ISO/IEC and has been adopted as an ISO/IEC29192 standard.