Unit 3-Symmetric Key Crypto_Part4

Unit 3-Symmetric Key Crypto_Part4 - A5/1 Based on shift...

Info iconThis preview shows pages 1–2. Sign up to view the full content.

View Full Document Right Arrow Icon
Unit 3 - 7 Stream Ciphers, cont. To decrypt ciphertext C , the same keystream S is again used p 0 = c 0 s 0 , p 1 = c 1 s 1 , p 2 = c 2 s 2 , . . . .
Background image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full DocumentRight Arrow Icon
Unit 3 - 8 Stream Ciphers, cont. We’ll discuss two examples of stream cipher
Background image of page 2
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: A5/1 Based on shift registers Used in GSM mobile phone system RC4 Based on a changing lookup table Used many places, including SSL protocol...
View Full Document

This note was uploaded on 03/17/2011 for the course ECE 4472 taught by Professor Ouda during the Fall '10 term at UWO.

Page1 / 2

Unit 3-Symmetric Key Crypto_Part4 - A5/1 Based on shift...

This preview shows document pages 1 - 2. Sign up to view the full document.

View Full Document Right Arrow Icon
Ask a homework question - tutors are online