0% found this document useful (0 votes)
109 views16 pages

Stream Ciphers: T U F O E C D

The document discusses stream ciphers, including: 1) Stream ciphers encrypt plaintext one byte at a time using XOR operations with a pseudorandom keystream, whereas block ciphers operate on blocks of plaintext. 2) Stream ciphers are faster than block ciphers and easier to implement in hardware. They are well-suited for applications like audio/video streaming. 3) Popular stream ciphers include RC4, while common block ciphers are AES, DES, and Blowfish. The document provides examples of stream cipher encryption and decryption.

Uploaded by

Ahmed Monder
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
109 views16 pages

Stream Ciphers: T U F O E C D

The document discusses stream ciphers, including: 1) Stream ciphers encrypt plaintext one byte at a time using XOR operations with a pseudorandom keystream, whereas block ciphers operate on blocks of plaintext. 2) Stream ciphers are faster than block ciphers and easier to implement in hardware. They are well-suited for applications like audio/video streaming. 3) Popular stream ciphers include RC4, while common block ciphers are AES, DES, and Blowfish. The document provides examples of stream cipher encryption and decryption.

Uploaded by

Ahmed Monder
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 16

TRIPOLI UNIVERSITY

FACULTY OF ENGINEERING
COMPUTER DEPARTMENT

Stream Ciphers

Presented by:
Azer Mohammed Eldukali
1
Supervisor:
Dr. Mehdi Elhafi
PRESENTATION OVERVIEW

 Introduction

 Difference between Block Cipher and Stream Cipher

 Stream Cipher

 Example

2
INTRODUCTION

The literature divides the symmetric ciphers into two


broad categories: stream ciphers and block ciphers.

Typical stream cipher encrypts plaintext one byte at a


time.

Modern stream ciphers are divided into two broad


categories: synchronous and nonsynchronous. 3
DIFFERENCE BETWEEN BLOCK CIPHER
AND STREAM CIPHER
The main difference between Block cipher and Stream
cipher is that block cipher converts the plain text into
cipher text by taking plain text’s block at a time. While
stream cipher converts the plain text into cipher text by
taking one byte of plain text at a time.

4
DIFFERENCE BETWEEN BLOCK CIPHER
AND STREAM CIPHER
A stream cipher eliminates the need to pad a message to
be an integral number of blocks.

It also can operate in real time.

The usual size of the block 128 bits or more in the Block
cipher. As against, 1 byte (8 bits) at a time is converted in
the stream cipher. 5
DIFFERENCE BETWEEN BLOCK CIPHER
AND STREAM CIPHER
A stream cipher is particularly appropriate for audio and
video streaming. A stream cipher is also frequently used
for browser – web-server links.

A block cipher, on the other hand, is more appropriate for


file transfer, etc.

6
DIFFERENCE BETWEEN BLOCK CIPHER
AND STREAM CIPHER
Popular block ciphers are:

DES, 3DES, AES, Blowfish, Twofish.

Popular stream ciphers:

RC4 which stands for Rivest Cipher 4.

7
DIFFERENCE BETWEEN BLOCK CIPHER
AND STREAM CIPHER
Block cipher uses both confusion and diffusion while
stream cipher relies only on confusion.

Stream ciphers are faster than block ciphers. The hardware


implementation of a stream cipher is also easier.

Block cipher, when used in the cipher feedback (CFB) mode


and output feedback (OFB) mode, can be deployed as a 8

stream cipher.
CIPHER FEEDBACK (CFB) MODE

9
OUTPUT FEEDBACK (OFB) MODE

10
STREAM CIPHER

We will now focus on ciphers that are designed explicitly to


work as stream ciphers.

11
STREAM CIPHER

In the figure below is a representative diagram of stream


cipher structure.

12
STREAM CIPHER

In this structure, a key is input to a pseudorandom bit


generator that produces a stream of 8-bit numbers that are
apparently random.

The output of the generator, called a keystream, is combined


one byte at a time with the plaintext stream using the
bitwise exclusive-OR (XOR) operation.
13
STREAM CIPHER

For a stream cipher to be secure, the pseudorandom


sequence of bytes should have as long a period as
possible. Note that every pseudorandom number
generator produces a seemingly random sequence that
eventually repeats. The longer the period, the more
difficult it is to break the cipher.
14
EXAMPLE

If the next byte generated by the generator is 01101100 and


the next plaintext byte is 11001100, then the resulting
cipher text byte is

Decryption requires the use of the same pseudorandom


sequence: 15
16

You might also like