Skip to main content

Introduction to Stream Ciphers

  • Chapter

Abstract

In this chapter we follow the history of ciphers from its beginning to modern days. The historic few point helps us to understand the difference between the two big classes of ciphers (block ciphers and stream ciphers). We analyse attacks from the past to learn for the future.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Notes

  1. 1.

    This is an important point that is often missed. Cryptography and proofs have a very special relation.

    What does it mean to say that a one-time pad is provably unconditionally secure? It is of course pointless to try to guess a pattern in a truly random sequence. This is exactly what the proof says. However, there are some rare examples where people try to use a one time-pad, but use a (weakly) biased random sequence. In this case there is a real chance to do some analysis and there are examples of successful attacks against such pseudo one-time pads.

    The one-time pad is a pure cipher, it does not secure the message against active attacks. So if you want to use a one-time pad, you should consider using it in addition to a perfect MAC to guarantee the authentication of the message.

    Finally, even the best cipher does not help if you use a malfunction protocol. There are a lot of examples where a system has been broken by ignoring the cipher completely and just using a protocol failure. Section 9.2.3 contains an interesting example of this kind.

    In a nutshell, security proofs are not worthless, but you must carefully check what the proof exactly says. It is often not what you really want (see also the discussion in Chap. 11).

References

  1. Bauer, F.L.: Kryptologie, Methoden und Maximen, 2 Auflage. Springer, Berlin (1994)

    Book  MATH  Google Scholar 

  2. Doyle, A.C.: The Return of Sherlock Holmes, chapter The Adventure of the Dancing Men. Georges Newnes, Ltd (1905). Originally published 1903, Available online http://en.wikisource.org/wiki/The_Adventure_of_the_Dancing_Men

  3. The estream project. http://www.ecrypt.eu.org/stream/

  4. Ferguson, N., Schneier, B.: Practical Cryptography. Wiley, New York (2003)

    Google Scholar 

  5. Kahn, D.: The Codebreakers. MacMillan, New York (1967)

    Google Scholar 

  6. Kerckhoffs, A.: La cryptographie militaire. Journal des sciences militaires, 9th series, 1883. (January 1883) pp. 5–83, (Feburary 1883) pp. 161–191

    Google Scholar 

  7. Poe, E.A.: The Gold-Bug. The Dollar Newspaper (Philadelphia, PA), vol. I, no. 23, pp. 1 and 4, June 28 1843. Available online http://www.eapoe.org/works/tales/goldbga2.htm

  8. Rejewski, M.: An application of the theory of permutations in breaking the Enigma cipher. Appl. Math. 16(4), 543–559 (1980)

    MathSciNet  Google Scholar 

  9. Stinson, D.R.: Cryptography, Theory, Practice, Discrete Mathematics and Its Applications, 3rd edn. Chapman & Hall/CRC, London (2006)

    Google Scholar 

  10. Ulbricht, H.: Die Chriffriermaschine ENIGMA Trügerische Sicherheit, Ein Beitrag zur Geschichte der Nachrichtendienste. PhD thesis, Fachbereich Mathematik und Informatik, Technische Universität Carolo-Wilhelmina zu Braunschweig (2005)

    Google Scholar 

  11. Ward, J.B.: The Beal Papers. Virginian Book and Job Print (1885)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Klein, A. (2013). Introduction to Stream Ciphers. In: Stream Ciphers. Springer, London. https://doi.org/10.1007/978-1-4471-5079-4_1

Download citation

Publish with us

Policies and ethics