• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

Need help understanding stream cipher

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Cryptographic Theory and Cryptanalysis - Internal and Transmission Security

View previous topic :: View next topic  
Author Message
flit
Just Arrived
Just Arrived


Joined: 12 Oct 2010
Posts: 0


Offline

PostPosted: Tue Oct 12, 2010 1:14 am    Post subject: Need help understanding stream cipher Reply with quote

Hello,

I am trying to understand how stream cipher works, but the book I am reading is in my opinion not clear enough. So I did some research on the Internet and I made a drawing of how stream cipher works but the problem is I do not know if I got it right. Can you please read the encryption and decryption process I put together and check my drawing and correct me if I am wrong?

Thanks in advance.

Stream Cipher Encryption:
1. Starts with a secret key ("seed")
2. Sender and receiver both share the secret key
3. Sender and receiver generate identical key streams using the shared key
4. The clear text message will be processed bit by bit (as a stream)
5. The key stream is then logically combined with the plain text via Exclusive-Or (XOR) which is represented by a circle with a cross in it to produce cipher text.

Stream Cipher Decryption:
1. At the other end of the network, the receiver uses the shared secret key to produce identical key stream to the sender.
2. This is then XOR-ed with the incoming cipher text to reproduce the original text.

Link to the drawing:
http://www.mediafire.com/imgbnc.php/290d0281cb323ea574e8e21073e0e2016g.jpg
Back to top
View user's profile Send private message
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Cryptographic Theory and Cryptanalysis - Internal and Transmission Security All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register