0% found this document useful (0 votes)
30 views18 pages

STREAM CIPHER IN CRYPTOGRAPHYpptx

The document discusses stream ciphers in cryptography, explaining their function as encryption techniques that transform plaintext into ciphertext using keystreams. It outlines the processes of encryption and decryption, emphasizing the use of XOR operations with keystreams for both. Additionally, it highlights various applications of stream ciphers, including secure communication, streaming media, and IoT security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
30 views18 pages

STREAM CIPHER IN CRYPTOGRAPHYpptx

The document discusses stream ciphers in cryptography, explaining their function as encryption techniques that transform plaintext into ciphertext using keystreams. It outlines the processes of encryption and decryption, emphasizing the use of XOR operations with keystreams for both. Additionally, it highlights various applications of stream ciphers, including secure communication, streaming media, and IoT security.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 18

STREAM CIPHER IN

CRYPTOGRAPHY
Omkar R.Raichurkar
RegNo: 240970152
CRYPTOGRAPHY
"Cryptography is technique of securing information and
communications through use of codes so that only those person for
whom the information is intended can understand it and process it".

Thus preventing unauthorized access to


information.

The prefix "crypt" means "hidden" and suffix


"graphy" means "writing".

In Cryptography the techniques which are use to


protect information are obtained from mathematical
concepts and a set of rule based calculations known
as algorithms to convert messages in ways that
make it hard to decode it.

These algorithms are used for cryptographic key


generation, digital signing, verification to protect
data privacy, web browsing on internet and to
protect confidential transactions such as credit card
and debit card transactions.
TYPES OF CRYPTOGRAPHY
1.SYMMETRIC KEY
One key is used for both encryption and decryption in symmetric encryption.
The algorithm and key combine to encrypt the original sensitive information by converting plaintext
into ciphertext.
This is effective for storing data that has to be decrypted at a later time.
The use of a single key for encryption and decryption raises concerns because if the key got
compromised, all the data it has encrypted would also be at risk.
2.ASYMMETRIC KEYS
Asymmetric cryptography, commonly called public key cryptography, is a more recent technology
than symmetric encryption.
A plain text is encrypted using two keys in asymmetric encryption. Over the Internet or a vast network,
secret keys are exchanged. It prevents malicious individuals from misusing the keys.
Asymmetric cryptography uses two related keys to increase security since it is crucial to keep in mind
that anybody with access to the secret key may decrypt the message.
Anybody who wants to send you a message may get a public key. The second private key is kept secret
so that only you Are aware of it.
3.HASH FUNCTIONS
There is no usage of any key in this algorithm. A hash value with fixed length is calculated as per the
plain text which makes it impossible for contents of plain text to be recovered. Many operating
systems use hash functions to encrypt passwords.
PLAIN TEXT AND CIPHER TEXT
Plaintext: is the original, readable data or message before encryption.
The plaintext is the one where the unencrypted data is used as an input for the encryption process or as
the output for the decryption process.
Ciphertext: is the transformed, unreadable output that results from encrypting the plaintext, making
it secure from unauthorized access.
Ciphertext is unreadable, encrypted data that can only be read if you know the key. Learn all about
ciphertext and how it ensures your data privacy by securing computers and online communications,
including encrypted email.
ENCRYTION AND DECRYPTION
ENCRYPTION
It's the process of transforming readable data into an unreadable format. It uses mathematical
algorithms to achieve this and can be performed on any kind of data, including emails, documents, and
messages.
Encryption is often used in the digital world, where it's applied to files, emails, and even entire hard
drives. It's also used in securing wireless networks and is the backbone of many online banking
systems. Without encryption, our data would be vulnerable to anyone who wants to see it.
Another thing to consider is that encryption keys are generated by two different algorithms —
symmetrical and asymmetrical.
Symmetrical algorithm allows for a shared key between users on both ends, while asymmetrical
algorithm requires two keys (one public and one private) for each user.
DECRYPTION
Decryption is the process of transforming encrypted data into its original form so that humans can
read it. This is done by reversing the encryption process, using the same algorithm, key, or password.
There are many different applications for decryption, including recovering lost or forgotten
passwords, accessing encrypted data for analysis, and restoring files that have been damaged or
corrupted. In some cases, decryption may also be used to remove security measures from files or
systems so that they can be used without restriction.
STREAM CIPHER ALGORITHM
"A stream cipher is an encryption technique that
works byte by byte to transform plain text into code
that's unreadable to anyone without the proper
key. "
Stream ciphers are linear, so the same key both encrypts and decrypts messages.

Stream ciphers rely on:


Plaintext. You must have a message you'd like to encode.
Keystreams. A set of random characters replaces those in the plaintext. They could be numbers,
letters, or symbols.
Ciphertext. This is the encoded message.
Encryption & Decryption with Stream Ciphers
Encryption:

For Encryption,
Plain Text and Keystream produces Cipher Text (Same keystream will be used for decryption.).
The Plaintext will undergo XOR operation with key stream bit-by-bit and produces the Cipher Text.
Plain Text : 10011001
Keystream : 11000011
Cipher Text : 01011010
Decryption:
For Decryption,

Cipher Text and Keystream gives the original Plain Text (Same keystream will be used for encryption.).
The Ciphertext will undergo XOR operation with keystream bit-by-bit and produces the actual Plain
Text.

Example:

Cipher Text : 01011010

Keystream : 11000011

Plain Text : 10011001


Diagram of Stream Cipher
APPLICATIONS
Secure Communication: Used in VoIP (Voice over Internet Protocol) and video conferencing to encrypt
voice and video data in real-time.
Streaming Media: Protects audio and video streams, ensuring secure delivery over the internet.
Wireless Networks: Commonly used in protocols like WEP and WPA for encrypting data in wireless
communications.
Instant Messaging: Employed in secure messaging apps to encrypt messages as they are sent and
received.
IoT Security: Used in Internet of Things devices to secure communications between devices with
limited processing power.
Data Encryption: Suitable for encrypting data in transit, such as during file transfers or online
transactions, where quick processing is essential.
Game Data: Protects real-time game data to prevent cheating and maintain user privacy.
EXAMPLE
Solve the problem P='KIWI', key='E' using stream cipher. Perform encryption and decryption.
THANK YOU

You might also like