Open main menu
Home
Random
Recent changes
Special pages
Community portal
Preferences
About Wikipedia
Disclaimers
Incubator escapee wiki
Search
User menu
Talk
Dark mode
Contributions
Create account
Log in
Editing
Stream cipher
(section)
Warning:
You are not logged in. Your IP address will be publicly visible if you make any edits. If you
log in
or
create an account
, your edits will be attributed to your username, along with other benefits.
Anti-spam check. Do
not
fill this in!
{{short description|Type of symmetric key cipher}} {{More citations needed|date=October 2021}} [[Image:A5-1 GSM cipher.svg|280px|thumbnail| The operation of the [[keystream]] generator in [[A5/1]], an LFSR-based stream cipher used to encrypt mobile phone conversations.]] <span lang="my" dir="ltr">A</span> '''stream cipher''' is a [[symmetric key algorithm|symmetric key]] [[cipher]] where plaintext digits are combined with a [[pseudorandom]] cipher digit stream ([[keystream]]). In a stream cipher, each [[plaintext]] [[numerical digit|digit]] is encrypted one at a time with the corresponding digit of the keystream, to give a digit of the [[ciphertext]] stream. Since encryption of each digit is dependent on the current state of the cipher, it is also known as '''''state cipher'''''. In practice, a digit is typically a [[bit]] and the combining operation is an [[exclusive-or]] (XOR). The pseudorandom keystream is typically generated serially from a random [[seed value]] using digital [[shift register]]s. The [[seed value]] serves as the [[cryptographic key]] for decrypting the ciphertext stream. Stream ciphers represent a different approach to symmetric encryption from [[block cipher]]s. Block ciphers operate on large blocks of digits with a fixed, unvarying transformation. This distinction is not always clear-cut: in some [[block cipher mode of operation|modes of operation]], a block cipher primitive is used in such a way that it acts effectively as a stream cipher. Stream ciphers typically execute at a higher speed than block ciphers and have lower hardware complexity. However, stream ciphers can be susceptible to security breaches (see [[stream cipher attack]]s); for example, when the same starting state (seed) is used twice.
Edit summary
(Briefly describe your changes)
By publishing changes, you agree to the
Terms of Use
, and you irrevocably agree to release your contribution under the
CC BY-SA 4.0 License
and the
GFDL
. You agree that a hyperlink or URL is sufficient attribution under the Creative Commons license.
Cancel
Editing help
(opens in new window)