What is a current cipher?

Stream Cipher is a type of algorithm used in data encryption, where the source that needs to be encrypted is processed against a key sequence that seems to be random. This type of cipher is somewhat flexible in the sense that encryption may change in text processing. Sometimes they are also referred to as state ciphers, because encryption also depends on the current state of the operation. Unlike blocked ciphers that work on 64 -bit data at a time, the encryption current can work on one piece. For this reason, the current can be processed at high speeds with very low power. In a one -time pad, the generated key is the same length as the date that must be encrypted, is completely accidental and never used anywhere Else, from there the name.

When processing against data to be encrypted, usually referred to as simple text, it is not possible to decrypt the resulting dial without the key. MostIt is difficult to deal with the scenarios and therefore it is used only for very exclusive situations. Yet it is usually considered useful, so the keys were shortened and created by pseudorandom, which means they are statistically random, but in fact not.

Stream Cipher has the ability to encrypt while running. In this way, it is even easy for simple jet ciphers carried out by people on Peru and paper, while a block cipher usually requires the use of a computer for processing. The simple text flows through the process of encryption together with Keystream, a pseudorandomic sequence that forms a key where it is converted and comes from the other end as Ciphertext.

Visuals, this encryption occurs through exclusive or (xor) operations on individual bits as they go through cipher. A simple xor cipher uses as its basis a type of logical disjunction, which basically says the result can be true if one of the operand is true, but not both. For exampleLad, if a slightly moving encryption process is zero or one, and the paired keystream does not match, the resulting output is one. If the bit of bits and paired keys corresponds to where both or both are zero, the result is zero. The encrypted current of those and zeros is then decrypted at the other end of the transfer using the same keystream to convert bits back to the original simple text.

There are two types of jet ciphers. Using the synchronous method, the keyboard current is created separately from a simple text or dial, and then merges to provide encryption or decryption. In this way, both sending and receiving the ends of transmission must remain synchronized where they work on the same key and the same position in the key. If there is a problem, the decryption must either start again, or there may be flags that are located intermittently in the dial that indicate new initial points. Self-synchronizing cipher on the other side updates key current based on a certain Pšojtu previous digits in dials.

One of the most commonly used current ciphers called RC4 was created by RSA Data Security®. It is licensed for and is used in a range of software products, as well as Secure Socket Layer (SSL) used in secure internet communication and encryption of cable equivalent privacy (WEP) used with wireless devices. Another frequently used cipher is known as an Oryx that has found use in mobile phone data to encrypt. IBM® also developed a power encryption method known as SEAL, which found use in hard disk encryption.

IN OTHER LANGUAGES

Was this article helpful? Thanks for the feedback Thanks for the feedback

How can we help? How can we help?