Stream cipher attacks, the Glossary
Stream ciphers, where plaintext bits are combined with a cipher bit stream by an exclusive-or operation (xor), can be very secure if used properly.[1]
Table of Contents
25 relations: ASCII, Baudot code, Birthday attack, CipherSaber, Commutative property, Correlation attack, Differential cryptanalysis, Exclusive or, Initialization vector, John Tiltman, Lorenz cipher, Man-in-the-middle attack, Message authentication code, National Security Agency, Personal computer, Plaintext, Punched card, RC4, Replay attack, Running key cipher, Stream cipher, Traffic analysis, Wi-Fi Protected Access, Wired Equivalent Privacy, World War II.
ASCII
ASCII, an acronym for American Standard Code for Information Interchange, is a character encoding standard for electronic communication.
See Stream cipher attacks and ASCII
Baudot code
The Baudot code is an early character encoding for telegraphy invented by Émile Baudot in the 1870s.
See Stream cipher attacks and Baudot code
Birthday attack
A birthday attack is a bruteforce collision attack that exploits the mathematics behind the birthday problem in probability theory. Stream cipher attacks and birthday attack are cryptographic attacks.
See Stream cipher attacks and Birthday attack
CipherSaber
CipherSaber is a simple symmetric encryption protocol based on the RC4 stream cipher.
See Stream cipher attacks and CipherSaber
Commutative property
In mathematics, a binary operation is commutative if changing the order of the operands does not change the result.
See Stream cipher attacks and Commutative property
Correlation attack
Correlation attacks are a class of cryptographic known-plaintext attacks for breaking stream ciphers whose keystreams are generated by combining the output of several linear-feedback shift registers (LFSRs) using a Boolean function. Stream cipher attacks and Correlation attack are cryptographic attacks.
See Stream cipher attacks and Correlation attack
Differential cryptanalysis
Differential cryptanalysis is a general form of cryptanalysis applicable primarily to block ciphers, but also to stream ciphers and cryptographic hash functions. Stream cipher attacks and Differential cryptanalysis are cryptographic attacks.
See Stream cipher attacks and Differential cryptanalysis
Exclusive or
Exclusive or, exclusive disjunction, exclusive alternation, logical non-equivalence, or logical inequality is a logical operator whose negation is the logical biconditional.
See Stream cipher attacks and Exclusive or
Initialization vector
In cryptography, an initialization vector (IV) or starting variable is an input to a cryptographic primitive being used to provide the initial state.
See Stream cipher attacks and Initialization vector
John Tiltman
Brigadier John Hessell Tiltman, (25 May 1894 – 10 August 1982) was a British Army officer who worked in intelligence, often at or with the Government Code and Cypher School (GC&CS) starting in the 1920s.
See Stream cipher attacks and John Tiltman
Lorenz cipher
The Lorenz SZ40, SZ42a and SZ42b were German rotor stream cipher machines used by the German Army during World War II.
See Stream cipher attacks and Lorenz cipher
Man-in-the-middle attack
In cryptography and computer security, a man-in-the-middle (MITM) attack, or on-path attack, is a cyberattack where the attacker secretly relays and possibly alters the communications between two parties who believe that they are directly communicating with each other, as the attacker has inserted themselves between the two user parties. Stream cipher attacks and man-in-the-middle attack are cryptographic attacks.
See Stream cipher attacks and Man-in-the-middle attack
Message authentication code
In cryptography, a message authentication code (MAC), sometimes known as an authentication tag, is a short piece of information used for authenticating and integrity-checking a message.
See Stream cipher attacks and Message authentication code
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the Director of National Intelligence (DNI).
See Stream cipher attacks and National Security Agency
Personal computer
A personal computer, often referred to as a PC, is a computer designed for individual use.
See Stream cipher attacks and Personal computer
Plaintext
In cryptography, plaintext usually means unencrypted information pending input into cryptographic algorithms, usually encryption algorithms.
See Stream cipher attacks and Plaintext
Punched card
A punched card (also punch card or punched-card) is a piece of card stock that stores digital data using punched holes.
See Stream cipher attacks and Punched card
RC4
In cryptography, RC4 (Rivest Cipher 4, also known as ARC4 or ARCFOUR, meaning Alleged RC4, see below) is a stream cipher.
See Stream cipher attacks and RC4
Replay attack
A replay attack (also known as a repeat attack or playback attack) is a form of network attack in which valid data transmission is maliciously or fraudulently repeated or delayed. Stream cipher attacks and replay attack are cryptographic attacks.
See Stream cipher attacks and Replay attack
Running key cipher
In classical cryptography, the running key cipher is a type of polyalphabetic substitution cipher in which a text, typically from a book, is used to provide a very long keystream.
See Stream cipher attacks and Running key cipher
Stream cipher
A stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream).
See Stream cipher attacks and Stream cipher
Traffic analysis
Traffic analysis is the process of intercepting and examining messages in order to deduce information from patterns in communication. Stream cipher attacks and Traffic analysis are cryptographic attacks.
See Stream cipher attacks and Traffic analysis
Wi-Fi Protected Access
Wi-Fi Protected Access (WPA), Wi-Fi Protected Access 2 (WPA2), and Wi-Fi Protected Access 3 (WPA3) are the three security certification programs developed after 2000 by the Wi-Fi Alliance to secure wireless computer networks.
See Stream cipher attacks and Wi-Fi Protected Access
Wired Equivalent Privacy
Wired Equivalent Privacy (WEP) is a severely flawed security algorithm for 802.11 wireless networks.
See Stream cipher attacks and Wired Equivalent Privacy
World War II
World War II or the Second World War (1 September 1939 – 2 September 1945) was a global conflict between two alliances: the Allies and the Axis powers.
See Stream cipher attacks and World War II
References
[1] https://en.wikipedia.org/wiki/Stream_cipher_attacks
Also known as Stream cipher attack.