Примеры использования Stream cipher на Английском языке и их переводы на Русский язык
{-}
-
Official
-
Colloquial
Common stream ciphers in use today include RC4 and Salsa20.
He has also discovered weaknesses in the FISH cipher and designed the stream cipher Pike.
Stream cipher: use of a keystream to encrypt one bit at a time.
There are two major types of symmetric encryption:Block ciphers and stream ciphers.
Crypto1 is a stream cipher very similar in its structure to its successor, Hitag2.
In cryptography, MUGI is a pseudorandom number generator(PRNG)designed for use as a stream cipher.
ESTREAM is a project to"identify new stream ciphers suitable for widespread adoption", organised by the EU ECRYPT network.
The CSA algorithm is composed of two distinct ciphers: a block cipher and a stream cipher.
An experimental cipher called Rabbit, a public domain software stream cipher from the EU's eSTREAM project, is also included.
The stream cipher then generates 2 bits of pseudo-random stream on each round which are xored starting at bit 64 of the packet.
His notable work includes the design of the stream cipher LEX, as well as the cryptanalysis of numerous cryptographic primitives.
For stream ciphers, N{\displaystyle N} is specified by the number of internal states of the bit generator- probably different from the number of keys.
MonoVM RDP uses RSA Security's RC4 cipher, a stream cipher designed to efficiently encrypt small amounts of data.
Stream ciphers, on the other hand, encrypt each digit of the plaintext at a time(usually in the form of a bit), with the help of a pseudo-random key stream. .
The paper's attacks are based on the fact that CryptGenRandom uses the stream cipher RC4, which can be run backwards once its state is known.
Just as with other stream ciphers, flipping a bit in the ciphertext produces a flipped bit in the plaintext at the same location.
I makes use of the Advanced Encryption Standard(AES) block cipher, whereas WEP andWPA use the RC4 stream cipher.
Panama is a cryptographic primitive which can be used both as a hash function and a stream cipher, but its hash function mode of operation has been broken and is not suitable for cryptographic use.
Stream ciphers typically encrypt plaintext a bit or byte at a time, and are most commonly used to encrypt real-time communications, such as audio and video information.
In June 1941, the Germans started to introduce on-line stream cipher teleprinter systems for strategic point-to-point radio links, to which the British gave the code-name Fish.
He subsequently joined the COSIC research group, and has worked on the design andcryptanalysis of block ciphers, stream ciphers and cryptographic hash functions.
Recall that this tradeoff attack on stream cipher is successful if any of the given D{\displaystyle D} output prefixes is found in any of the matrices covering N{\displaystyle N.
The considerations already listed make several well-known chaining modes unsuitable: ECB mode, which cannot be tweaked, andmodes that turn block ciphers into stream ciphers, such as the CTR mode.
Although RadioGatún is a derivative of Panama, a stream cipher and hash construction from the late 1990s whose hash construction has been broken, RadioGatún does not have Panama's weaknesses when used as a hash function.
The cryptographic primitives used in Skype are: the AES block cipher, the RSA public-key cryptosystem, the ISO 9796-2 signature padding scheme,the SHA-1 hash function, and the RC4 stream cipher.
If this stream cipher has sampling resistance R 2- k{\displaystyle R=2^{-k}}, then an efficient enumeration can use a short name of n- k{\displaystyle n-k} bits to define the special states of the generator.
In terms of notable additions made, OpenBSD has added support for newer and more reputable algorithms(ChaCha stream cipher and Poly1305 message authentication code) along with a safer set of elliptic curves brainpool curves from RFC 5639, up to 512 bits in strength.
Let the stream cipher be of N 2 n{\displaystyle N=2^{n}} states each has a full name of n{\displaystyle n} bits and a corresponding output name which is the first n{\displaystyle n} bits in the output sequence of bits.
Hellman's block cipher technique can be applied to a stream cipher by using the same idea of covering the N{\displaystyle N} points space through matrices obtained from multiple variants f i{\displaystyle f_{i}} of the function f{\displaystyle f} which is the mapping of internal states to output prefixes.
However, it indirectly prohibits the use of stream ciphers, since stream ciphers require, for their security, that the same initial state not be used twice(which would be the case if a sector is updated with different data); thus this would require an encryption method to store separate initial states for every sector on disk-seemingly a waste of space.