Stream Ciphers
Approaches
Cryptographically secure pseudo-random number generators (PRNG).
Using linear feedback shift registers (LFSR).
Using block ciphers.
Other (families of functions, etc.).
Usually not self-synchronized.
Usually without uniform random access.
No immediate setup of the generator’s state for a given plaintext/cryptogram offset.
Most Common Algorithms
A5/1 (US, Europe), A5/2 (GSM).
RC4 (802.11 WEP/TKIP, etc.).
E0 (Bluetooth BR/EDR).
SEAL (w/ uniform random access).
Last updated