Question

In: Computer Science

2 newer techinques of stream ciphers

2 newer techinques of stream ciphers

Solutions

Expert Solution

Answer)

A Stream Cipher is defined to be a method meant for converting the plain text to that of the ciphertext on a direct basis which would belong to that of the family of the symmetric key cipher.

The stream cipher would not encrypt and decrypt the block of text at one single point of time, unlike the block cipher.

Some of the techniques which are being used on Stream cipher are as follows:

1) It either uses the binary digits which are to be used and the keystream is defined to be the combination with that of the plain text which is being used for the exclusive operations. This is referred to as the binary additive stream cipher and the sender, as well as a receiver, would have the exact steps for decryption for being successful.

2) Stream cipher uses the smaller yet more convenient key which is 128 bits and with respect to this key, it helps in generating the pseudorandom keystream which gets combined with that of the plaintext digits in a same way as that of the one time pad.

Example of Stream Cipher is RC4 which is the newest stream cipher

Hope this answer helps.
If you find the answer useful please hit like.
Thanks


Related Solutions

(a) What is the difference between synchronous and asynchronous stream ciphers. (b) Who was Horst Feistel?...
(a) What is the difference between synchronous and asynchronous stream ciphers. (b) Who was Horst Feistel? (c) What is the main weakness of affine ciphers? (d) What is the Kerckhoffs’ principle? (e) Suppose a block cipher uses m-to-m bits S-boxes. How many bits are required to store the look-up table of k different such m-to-m bits S-boxes? Give a formula in terms of k and m. Hint: A look-up table for one DES S-box requires 256 bits of storage.
Using Ubuntu SeedLab For block ciphers, when the size of a plaintext is not a multiple...
Using Ubuntu SeedLab For block ciphers, when the size of a plaintext is not a multiple of the block size, padding may be required. All the block ciphers normally use PKCS#5 padding, which is known as standard block padding. We will conduct the following experiments to understand how this type of padding works: 1. Use ECB, CBC, CFB, and OFB modes to encrypt a file (you can pick any cipher). Please report which modes have paddings and which ones do...
2. (13 pts.) A factory is considering replacing its existing coining press with a newer, more...
2. (13 pts.) A factory is considering replacing its existing coining press with a newer, more efficient one. The existing press was purchased 4 years ago for $450,000 and is being depreciated according to a 7-year MACRS depreciation schedule. (See page 4 for the MACRS schedules.) The factory’s CFO estimates that the existing press has 5 years of useful life remaining. The new press’s purchase price is $560,000. Installation of the new press would cost an additional $40,000; this installation...
AES (a) Give the names of at least two finalist ciphers, besides Rijndael, of the AES...
AES (a) Give the names of at least two finalist ciphers, besides Rijndael, of the AES competition. (b) What are the main four layers (steps within each round) of the AES and what is their role in the encryption? (c) The recommended key sizes for the AES are 128, 192 and 256 bits. How many rounds of AES should be done for each of these sizes? (d) DES has 8 different S-boxes, AES has only 1. State briefly negative security...
Information Security -Why are modes of operation needed for block ciphers like AES?
Information Security -Why are modes of operation needed for block ciphers like AES?
Using the SARS-CoV-2 tests, explain the processes required for scaling up production of the newer diagnostic...
Using the SARS-CoV-2 tests, explain the processes required for scaling up production of the newer diagnostic testing in a global pandemic and regulatory processes required for use of new diagnostic tests for COVID-19 within Australia, Europe and the United States of America. This section is to describe the some of the manufacturing challenges associated with meeting the rapid demand for tests during emergency or disaster management. Diagnostic tests require regulatory approval by FDA (US), TGA (Australia) and CE (European Union)....
500 kmol/h of an air stream at a pressure of 2 atm is to be heated...
500 kmol/h of an air stream at a pressure of 2 atm is to be heated from 15 celsius to 90 celsius in a heat exchanger with 600 kPa steam condensing in the shell side of the heat exchanger. Steam enters the exchanger as a saturated vapor and leaves as a saturated liquid. A) How much steam would be required if a conventional heat exchanger were used? what is the total entropy change during this process? B) How much steam...
What is cryptography? Compare and contrast Transposition, Substitution, and Product ciphers with examples Hurry up please
What is cryptography? Compare and contrast Transposition, Substitution, and Product ciphers with examples Hurry up please
As this is a newer trending technology in the financial industry and one that is being...
As this is a newer trending technology in the financial industry and one that is being expanded upon. Block chain, being composed of current technologies, is poised to become a major technology with large social impacts. What is block chain and what are the security limitations? Write a five-page paper from scholarly sources and properly cite your writing.
2. A) What is the present value of a cash flow stream of $10,000 per year...
2. A) What is the present value of a cash flow stream of $10,000 per year at an interest rate of 6% starting one year from today and goes on forever? B) What is the present value of a cash flow stream of $10,000 per year starting one year from today that grows at 3% at an interest rate of 6% starting one year from today and goes on forever? C) What is the present value of a cash flow...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT