Introduction to Stream Ciphers - Lecture Note
Introduction to Stream Ciphers - Lecture Note
Operatio
Encrypts data bit-by-bit. Encrypts fixed-size blocks (e.g., 128 bits).
n
1
Feature Stream Ciphers Block Ciphers
2. Rotor-Based Systems
Rotor-based systems are mechanical stream ciphers that originated in the early
20th century. They were used for secure military and diplomatic communications.
Strengths:
o Dynamic substitution made it difficult to detect patterns.
2
Weaknesses:
o Limited diffusion (letters mapped to the same letters after a full cycle).
3
3.3 Example: A5/1 Cipher
A5/1 is a stream cipher used in GSM mobile communications.
Components:
o Three LFSRs with different lengths and feedback polynomials.
Vulnerability:
o Correlation attacks exploit statistical weaknesses in key stream
generation.
o Key length should be sufficient (at least 128 bits) to prevent brute-
force attacks.
3. Resistance to Attacks:
o Must resist correlation, side-channel, and known plaintext attacks.
4.3 Synchronization:
Stream ciphers require tight synchronization between the sender and receiver. Loss
of synchronization leads to decryption errors.
4
5. Cryptanalysis of Stream Ciphers
Cryptanalysis aims to identify weaknesses in encryption algorithms.
2. Replay Attacks:
o Exploits key stream reuse to recover plaintext.
3. Side-Channel Attacks:
o Analyze timing, power, or electromagnetic leakage to deduce keys.
A5/1 Attacks:
o Time-memory tradeoff attacks revealed significant weaknesses.
6. Combined Encryption
Hybrid encryption methods combine the advantages of stream and block ciphers for
enhanced security.
5
o ChaCha20-Poly1305: Combines a stream cipher with a MAC for
authenticated encryption.
6.2 Advantages:
Flexibility to handle diverse data types.
Enhanced security through hybrid approaches.
Optimization for both high-throughput and low-latency requirements.
7. Practical Examples
8. Conclusion
Stream ciphers are essential for scenarios requiring fast and low-latency encryption.
Understanding their design, vulnerabilities, and real-world applications is critical for
implementing secure systems.