en.unionpedia.org

Stream cipher attacks, the Glossary

Index Stream cipher attacks

Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly.[1]

Table of Contents

  1. 25 relations: ASCII, Baudot code, Birthday attack, CipherSaber, Commutative property, Correlation attack, Differential cryptanalysis, Exclusive or, Initialization vector, John Tiltman, Lorenz cipher, Man-in-the-middle attack, Message authentication code, National Security Agency, Personal computer, Plaintext, Punched card, RC4, Replay attack, Running key cipher, Stream cipher, Traffic analysis, Wi-Fi Protected Access, Wired Equivalent Privacy, World War II.

ASCII

ASCII, an acronym for American Standard Code for Information Interchange, is a character encoding standard for electronic communication.

See Stream cipher attacks and ASCII

Baudot code

The Baudot code is an early character encoding for telegraphy invented by Émile Baudot in the 1870s.

See Stream cipher attacks and Baudot code

Birthday attack

A birthday attack is a bruteforce collision attack that exploits the mathematics behind the birthday problem in probability theory. Stream cipher attacks and birthday attack are cryptographic attacks.

See Stream cipher attacks and Birthday attack

CipherSaber

CipherSaber is a simple symmetric encryption protocol based on the RC4 stream cipher.

See Stream cipher attacks and CipherSaber

Commutative property

In mathematics, a binary operation is commutative if changing the order of the operands does not change the result.

See Stream cipher attacks and Commutative property

Correlation attack

Correlation attacks are a class of cryptographic known-plaintext attacks for breaking stream ciphers whose keystreams are generated by combining the output of several linear-feedback shift registers (LFSRs) using a Boolean function. Stream cipher attacks and Correlation attack are cryptographic attacks.

See Stream cipher attacks and Correlation attack

Differential cryptanalysis

Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. Stream cipher attacks and Differential cryptanalysis are cryptographic attacks.

See Stream cipher attacks and Differential cryptanalysis

Exclusive or

Exclusive or, exclusive disjunction, exclusive alternation, logical non-equivalence, or logical inequality is a logical operator whose negation is the logical biconditional.

See Stream cipher attacks and Exclusive or

Initialization vector

In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state.

See Stream cipher attacks and Initialization vector

John Tiltman

Brigadier John Hessell Tiltman, (25 May 1894 – 10 August 1982) was a British Army officer who worked in intelligence, often at or with the Government Code and Cypher School (GC&CS) starting in the 1920s.

See Stream cipher attacks and John Tiltman

Lorenz cipher

The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II.

See Stream cipher attacks and Lorenz cipher

Man-in-the-middle attack

In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two user parties. Stream cipher attacks and man-in-the-middle attack are cryptographic attacks.

See Stream cipher attacks and Man-in-the-middle attack

Message authentication code

In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking a message.

See Stream cipher attacks and Message authentication code

National Security Agency

The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI).

See Stream cipher attacks and National Security Agency

Personal computer

A personal computer, often referred to as a PC, is a computer designed for individual use.

See Stream cipher attacks and Personal computer

Plaintext

In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms.

See Stream cipher attacks and Plaintext

Punched card

A punched card (also punch card or punched-card) is a piece of card stock that stores digital data using punched holes.

See Stream cipher attacks and Punched card

RC4

In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher.

See Stream cipher attacks and RC4

Replay attack

A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. Stream cipher attacks and replay attack are cryptographic attacks.

See Stream cipher attacks and Replay attack

Running key cipher

In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream.

See Stream cipher attacks and Running key cipher

Stream cipher

A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).

See Stream cipher attacks and Stream cipher

Traffic analysis

Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. Stream cipher attacks and Traffic analysis are cryptographic attacks.

See Stream cipher attacks and Traffic analysis

Wi-Fi Protected Access

Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks.

See Stream cipher attacks and Wi-Fi Protected Access

Wired Equivalent Privacy

Wired Equivalent Privacy (WEP) is a severely flawed security algorithm for 802.11 wireless networks.

See Stream cipher attacks and Wired Equivalent Privacy

World War II

World War II or the Second World War (1 September 1939 – 2 September 1945) was a global conflict between two alliances: the Allies and the Axis powers.

See Stream cipher attacks and World War II

References

[1] https://en.wikipedia.org/wiki/Stream_cipher_attacks

Also known as Stream cipher attack.