10 hours 28 minutes

Video Description

This lesson discusses streams, which is a type of symmetric cipher. Stream ciphers can work via scrambling characters, shifting them left or right. This is also known as transposition. Another method is substitutions. There is also a method called XOR which uses the key bit by bit to provide encryption.

Video Transcription

all right. So we just talked about symmetric blocks like this, how they choked at and walks and operate on a block. At the time. The other type of symmetric ciphers, called a stream
and a strain works on a single bit of it encrypts very, very fast. As a matter of fact, it's really best incorporated with barbed wire mechanisms,
because what happens is to take advantage of speaking the harbor device that just spit out once and zeros quickly, quick.
Okay, now with your stream size is getting one bit of the time. And there are a couple of different ways that stream ciphers can work. A common way is transposition, and transposition is scrambling to care, you know, shifting the characters left or right
straight with them. So, for instance, if the word was the
train's position, it might be HT, for instance, so scrambling the characters
substitution pure substitution is replacing one character with nothing,
and a lot of times we want multiple substitution, multiple trans positions. But then there's also a process called X four and X, or stands for exclusive. Or let me just show you how ex war works X for
So the way explore works is let's just say I've got some plain tax and once again that plain text will be a series of ones and zeros. And then I'm gonna have a pseudo bravely generated key
and again, I just randomly make leads up.
But with this particular encryption mechanism again, it's a stream. So what it does uses the key, it bit by bit to providing.
It's actually fairly easy, because when you match up the plain text with key,
where the values are alike,
the cipher text become serious.
Where the values are different, side cash becomes one.
So I, following this rule, play Texas one that he is zero. Those were different values. So the cipher comes.
These values are the same serum, a different one
different, one different, one
saying zero
same serum. So this is a very quick process called exploring. But what it does is it provides encryption bit by bit by bit and a lot of algorithms that air stream ciphers. Many of them use that
the most common stream cipher is one called Arcee, and this is used by our wireless calls. Wept in W p. A.
Not W P. A to,
but, uh, what happened? W p A. And you could see how very fast this was to provide encryption. You take the key matchup that I've been with playing Paxton to Values are different yet Cipher text 12 values say cipher text
so very quick to encrypt. But also, if you have the key, it's very quick to decrypt because if you just match the cipher key, well, those were different. It's gotta be one.
There's a difference. Can be won
different, different ones saying zero. So it's very quick to encrypt is very quick to decrypt, and that's a real advantage of RC four. However, when we gain speed, a lot of times we trade security. So RC four is not considered near Lee's here
as a block cipher. Like eight. Yes, and as a matter of fact, I just said Weapon W P. A. Usar C. Four. When we went to W p. A. To which is really
the Wildfire protocol, we wanted to get to
w G eight to It's a big change. Is it going to advance Encryption State 80 s a block cipher that's stronger and more secure, and that's a big step in the right direction.
So that's your stream, ciphers. Very fast. The Onley Stream cipher. You would need to know for this examines RC four.
Hey there other RC subs or two and three and five and six. None of those are strengths. The Onley Stream cipher. How would you know his ***?
So if you were to see something I blowfish past two fish walk, walk, walk, walk, block The only one that I need you to know for straight.

Up Next


In our online CompTIA CASP training, you will learn how to integrate advanced authentication, how to manage risk in the enterprise, how to conduct vulnerability assessments and how to analyze network security concepts and components.

Instructed By

Instructor Profile Image
Kelly Handerhan
Senior Instructor