Demystifying Stream Ciphers in Symmetric Encryption (2024)

Cryptography

Stream ciphers fall under the symmetric encryption category. Thus, using stream ciphers the sender and the recipient of the data use the same key to encrypt and decrypt the data.

A stream cipher is different from a block cipher. In a stream cipher one byte (8 bit) of data is encrypted at a time while in block cipher, a block of data is encrypted at a time (usually 128 bits).

What is a keystream?

Stream ciphers make use of something called keystream. A keystream is a random 8-bit output that is generated by supplying a key to a pseudorandom bit generator. The 8-bit output generated is called keystream and is used in the encryption and decryption of data in a given stream cipher algorithm.

Encryption

Steps

  1. For encryption, plain text and keystream are required.
  2. The plain text and keystream produce ciphertext using XOR Operation.
  3. Plain text is XOR’ed with keystream bit by bit to produce CipherText.

Example

Plain Text: 10011001

Keystream: 11000011

---------------------

Ciphertext: 01011010

Decryption

Steps

  1. For decryption, ciphertext and the same keystream are required which was used for encryption.
  2. The ciphertext and the keystream produce plain text using XOR Operation.
  3. The ciphertext is XOR’ed with keystream bit by bit to produce PlainText.

Example

Ciphertext: 01011010

Keystream: 11000011

----------------------

Plain Text: 10011001

Popular stream ciphers

Following are the popular stream ciphers used for encrypting the data.

  • RC4
  • SALSA
  • SOSEMANUK
  • PANAMA

Block cipher and stream cipher differences

Following are the differences between block cipher and stream cipher in tabulated form.

Block CiphersStream CiphersBlock Ciphers converts plain text to cipher text by taking a block at a timeStream Ciphers converts plain text to cipher text by taking 1 byte of plain text at a timeBlock Ciphers encrypt 64 bits or more at a timeStream Ciphers encrypt 8 bits at a time.It is more simple than Stream CiphersIt is more complex than Block CiphersIt uses confusion as well as diffusion.It uses only confusion.Reverse Encryption is harderReverse Encryption is very simpleSlower than stream cipherFaster than block cipherIt works on transposition techniques like Caesar cipher, polygram substitution cipher etc.It works on substitution techniques like rail-fence technique, columnar transposition technique etc.

Demystifying Stream Ciphers in Symmetric Encryption (2)

Learn Applied Cryptography

Build your applied cryptography and cryptanalysis skills with 13 courses covering hashing, PKI, SSL/TLS, full disk encryption and more.

Sources

  1. https://www.sciencedirect.com/topics/computer-science/stream-ciphers
  2. https://www.geeksforgeeks.org/stream-ciphers/
  3. https://www.geeksforgeeks.org/difference-between-block-cipher-and-stream-cipher/
  4. https://www.tutorialspoint.com/difference-between-block-cipher-and-stream-cipher

Posted: January 11, 2021

Demystifying Stream Ciphers in Symmetric Encryption (3)

Nitesh Malviya

Nitesh Malviya is a Security Consultant. He has prior experience in Web Appsec, Mobile Appsec and VAPT. At present he works on IoT, Radio and Cloud Security and open to explore various domains of CyberSecurity. He can be reached on his personal blog - https://nitmalviya03.wordpress.com/ and Linkedin - https://www.linkedin.com/in/nitmalviya03/.

Demystifying Stream Ciphers in Symmetric Encryption (2024)
Top Articles
Upwork Hourly Rates Study: This is What Freelancers Are Charging Today
Cryptocurrency: What is it and how does it work?
English Bulldog Puppies For Sale Under 1000 In Florida
Katie Pavlich Bikini Photos
Gamevault Agent
Pieology Nutrition Calculator Mobile
Hocus Pocus Showtimes Near Harkins Theatres Yuma Palms 14
Hendersonville (Tennessee) – Travel guide at Wikivoyage
Compare the Samsung Galaxy S24 - 256GB - Cobalt Violet vs Apple iPhone 16 Pro - 128GB - Desert Titanium | AT&T
Vardis Olive Garden (Georgioupolis, Kreta) ✈️ inkl. Flug buchen
Craigslist Dog Kennels For Sale
Things To Do In Atlanta Tomorrow Night
Non Sequitur
Crossword Nexus Solver
How To Cut Eelgrass Grounded
Pac Man Deviantart
Alexander Funeral Home Gallatin Obituaries
Energy Healing Conference Utah
Geometry Review Quiz 5 Answer Key
Hobby Stores Near Me Now
Icivics The Electoral Process Answer Key
Allybearloves
Bible Gateway passage: Revelation 3 - New Living Translation
Yisd Home Access Center
Home
Shadbase Get Out Of Jail
Gina Wilson Angle Addition Postulate
Celina Powell Lil Meech Video: A Controversial Encounter Shakes Social Media - Video Reddit Trend
Walmart Pharmacy Near Me Open
Marquette Gas Prices
A Christmas Horse - Alison Senxation
Ou Football Brainiacs
Access a Shared Resource | Computing for Arts + Sciences
Vera Bradley Factory Outlet Sunbury Products
Pixel Combat Unblocked
Movies - EPIC Theatres
Cvs Sport Physicals
Mercedes W204 Belt Diagram
Mia Malkova Bio, Net Worth, Age & More - Magzica
'Conan Exiles' 3.0 Guide: How To Unlock Spells And Sorcery
Teenbeautyfitness
Where Can I Cash A Huntington National Bank Check
Topos De Bolos Engraçados
Sand Castle Parents Guide
Gregory (Five Nights at Freddy's)
Grand Valley State University Library Hours
Holzer Athena Portal
Hello – Cornerstone Chapel
Stoughton Commuter Rail Schedule
Nfsd Web Portal
Selly Medaline
Latest Posts
Article information

Author: Lakeisha Bayer VM

Last Updated:

Views: 5884

Rating: 4.9 / 5 (69 voted)

Reviews: 84% of readers found this page helpful

Author information

Name: Lakeisha Bayer VM

Birthday: 1997-10-17

Address: Suite 835 34136 Adrian Mountains, Floydton, UT 81036

Phone: +3571527672278

Job: Manufacturing Agent

Hobby: Skimboarding, Photography, Roller skating, Knife making, Paintball, Embroidery, Gunsmithing

Introduction: My name is Lakeisha Bayer VM, I am a brainy, kind, enchanting, healthy, lovely, clean, witty person who loves writing and wants to share my knowledge and understanding with you.