How does a stream cipher work?
A stream cipher works roughly like a one-time pad.
Just as in one-time pad, it can be broken if (A) you have insight into what the pad looks like, or if (B) the pad is used multiple times.
The difference is that the “pad” in a stream cipher is not random, but pseudorandom - called a “keystream”.
The pad/keystream essentially comes from a PRNG, which is seeded by (secret key + nonce).
So the PRNG seed has a constant secret half (the secret key), and a changing public half (the nonce).
The constant secret half (the key) prevents the first kind of breakage (A: attacker having insight into the pad).
The changing public half (the nonce) prevents the second kind of breakage (B: the pad being used multiple times).
More by Jim
- Your syntax highlighter is wrong
- Granddad died today
- The Three Ts of Time, Thought and Typing: measuring cost on the web
- I hate telephones
- The sorry state of OpenSSL usability
- The dots do matter: how to scam a Gmail user
- My parents are Flat-Earthers
- How Hacker News stays interesting
- Project C-43: the lost origins of asymmetric crypto
- The hacker hype cycle
- The inception bar: a new phishing method
- Time is running out to catch COVID-19
- A probabilistic pub quiz for nerds
- Smear phishing: a new Android vulnerability
Tagged . All content copyright James Fisher 2016. This post is not associated with my employer. Found an error? Edit this page.