Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly.[citation...
7 KB (1,029 words) - 00:34, 14 November 2024
stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher,...
23 KB (2,223 words) - 16:47, 18 June 2025
are experts who found that the Turing stream cipher has a number of weaknesses when faced with chosen IV attacks. For instance, its key scheduling algorithm...
3 KB (328 words) - 01:12, 15 June 2024
cryptography, WAKE is a stream cipher designed by David Wheeler in 1993. WAKE stands for Word Auto Key Encryption. The cipher works in cipher feedback mode, generating...
2 KB (253 words) - 06:30, 19 July 2024
SHrinking) stream cipher is a fast software based stream cipher using Lagged Fibonacci generators, plus a concept from the shrinking generator cipher. It was...
1 KB (150 words) - 06:08, 18 February 2024
The Pike stream cipher was invented by Ross Anderson to be a "leaner and meaner" version of FISH after he broke FISH in 1994. Its name is supposed to...
1 KB (235 words) - 07:29, 19 June 2025
Trivium is a synchronous stream cipher designed to provide a flexible trade-off between speed and gate count in hardware, and reasonably efficient software...
10 KB (1,129 words) - 03:18, 17 October 2023
Symmetric-key algorithm (redirect from Symmetric cipher)
can use either stream ciphers or block ciphers. Stream ciphers encrypt the digits (typically bytes), or letters (in substitution ciphers) of a message...
15 KB (1,540 words) - 19:12, 22 April 2025
is a synchronous stream cipher algorithm submitted to the eSTREAM Project of the eCRYPT network. In the final specification the cipher is called ACHTERBAHN-128/80...
5 KB (532 words) - 21:28, 12 December 2024
that do not require padding because they effectively use a block cipher as a stream cipher. Historically, encryption modes have been studied extensively...
52 KB (5,828 words) - 12:52, 13 June 2025
In cryptography, the QUAD cipher is a stream cipher which was designed with provable security arguments in mind. QUAD relies on the iteration of a randomly...
7 KB (868 words) - 21:40, 29 October 2023
RC4 (redirect from RC4 Cipher)
In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher. While it is remarkable for its...
44 KB (5,055 words) - 11:29, 4 June 2025
count) is a cryptographically secure pseudorandom number generator and a stream cipher designed by Robert J. Jenkins Jr. in 1993. The reference implementation...
5 KB (567 words) - 09:26, 15 May 2025
Rabbit is a high-speed stream cipher from 2003. The algorithm and source code was released in 2008 as public domain software. Rabbit was first presented...
5 KB (640 words) - 06:33, 27 September 2023
Phelix (redirect from Helix (cipher))
Attacks against the Helix Stream Cipher" "eSTREAM Short Report on the End of the Second Phase" "Differential-Linear Attacks against the Stream Cipher...
8 KB (789 words) - 08:24, 28 November 2023
2006-10-11. Retrieved 26 January 2015. "A new distinguish attack against ABC stream cipher". IEEE Xplore. May 7, 2007. Retrieved June 12, 2025. v t e...
1 KB (116 words) - 11:22, 12 June 2025
Shamir attack is a stream cipher attack on the widely used RC4 stream cipher. The attack allows an attacker to recover the key in an RC4 encrypted stream from...
5 KB (843 words) - 19:54, 19 February 2024
Keystream (redirect from Key stream)
is a block mode that makes a block cipher produce a keystream and thus turns the block cipher into a stream cipher. In this simple example we use the...
3 KB (259 words) - 08:45, 30 January 2023
Cryptography (redirect from Codes and ciphers)
symmetric-key ciphers typically involves looking for attacks against the block ciphers or stream ciphers that are more efficient than any attack that could...
99 KB (11,007 words) - 11:28, 7 June 2025
Py is a stream cipher submitted to eSTREAM by Eli Biham and Jennifer Seberry. It is one of the fastest eSTREAM candidates at around 2.6 cycles per byte...
9 KB (1,235 words) - 23:12, 27 January 2024
In cryptography, SEAL (Software-Optimized Encryption Algorithm) is a stream cipher optimised for machines with a 32-bit word size and plenty of RAM with...
1 KB (140 words) - 17:55, 21 February 2025
Crypto-1 (category Stream ciphers)
Crypto1 is a proprietary encryption algorithm (stream cipher) and authentication protocol created by NXP Semiconductors for its MIFARE Classic RFID contactless...
6 KB (536 words) - 15:43, 12 January 2025
cryptography, a related-key attack is any form of cryptanalysis where the attacker can observe the operation of a cipher under several different keys...
5 KB (688 words) - 10:33, 3 January 2025
LEVIATHAN is a stream cipher submitted to NESSIE by Scott Fluhrer and David McGrew. It is a seekable stream cipher, which means that the user may efficiently...
2 KB (137 words) - 00:24, 19 February 2025
000". Stream ciphers, such as RC4, are vulnerable to a bit-flipping attack, as are some block cipher modes of operation. See stream cipher attack. A keyed...
3 KB (325 words) - 21:43, 21 June 2024
Grain is a stream cipher submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. It has been selected for the final eSTREAM portfolio...
8 KB (1,069 words) - 23:23, 16 June 2024
engineering (most often by telephone or email). Stream cipher attacks – Methods to break a stream cipher Protocol spoofing – Benign simulation of a protocol...
32 KB (3,674 words) - 16:39, 25 May 2025
integral attacks, slide attacks, boomerang attacks, the XSL attack, impossible differential cryptanalysis, and algebraic attacks. For a new block cipher design...
51 KB (6,569 words) - 08:42, 11 April 2025
MICKEY (category Stream ciphers)
KEYstream generator (MICKEY) is a stream cipher algorithm developed by Steve Babbage and Matthew Dodd. The cipher is designed to be used in hardware...
5 KB (677 words) - 21:39, 29 October 2023
algebraic equations used in the attack. Other cryptographic results of Courtois include algebraic attacks on stream ciphers, attacks on the KeeLoq and Hitag 2...
5 KB (386 words) - 20:10, 15 January 2025