Abdalla introduced an algorithm that employs a shuffling procedure to perform encryption of audio files, applying the stream cipher
ABSTRACT: A5/1 stream cipher
is a type of cryptographic algorithm which is widely used for encryption of the GSM communication.
It has a relatively simple algorithm; its compression function is a modified "double round" version of Bernstein's stream cipher
"chacha" which has been intensively analyzed and found to be of excellent performance and parallelizable .
The platform encrypts video with a pseudo random stream cipher
, and only authorized users are given the decryption key.
In 2004, based on the idea of guess-and-determine attack, Ralf-Phillip Weinmann and Kai Wirt presented an analysis on the stream cipher
part of CSA(CSA-SC) and the complexity of the attack is less than 245, based on their cipher representation and predicated on the state cycle structure of one of the registers during keystream generation.
It describes different types of wireless networks, including wi-fi, ZigBee, cellular mobile, ad hoc, cognitive radio, wireless mesh, and wireless sensor networks, followed by discussion of mobility, bandwidth, and node location management issues; message communication techniques and protocols in ad hoc networks; wireless local area networks; the placement of base stations in a cellular network and deployment of sensor nodes in wireless sensor networks; energy-efficient communication, with emphasis on physical, MAC (media access control), and network layers; and security aspects, including authentication, jamming, intrusion detection, and stream cipher
Our scheme uses a stream cipher
encryption algorithm called 2-Keys Symmetric Encryption  for protecting the confidentiality of data.
This paper proposes a stream cipher
developed based on the following two construction principles: (i) adjustment of the construction to the asymmetric capabilities of the involved parties; (ii) employment of the results regarding binary channels with insertion errors for enhancing security.
One possibility is to use some stream cipher
instead and consequently resolve the vulnerability to replay attacks.
15] Shinsaku Kiyomoto, Toshiaki Tanaka and Kouichi Sakurai "K2: A Stream Cipher
Algorithm using Dynamic Feedback Control" Springer, Communications in Computer and Information Science,, Vol.
According to operational procedure, cryptographic techniques can be further classified as stream cipher
and block cipher.
today announced that Enocoro a light weight stream cipher
developed by Hitachi in 2007, has received final approval by ISO/IEC and has been adopted as an ISO/IEC29192 standard.