A stream cipher where the keystream is generated independently of the plaintext message.

The equation for a synchronous cipher is:
let
sigmai+1=f(sigmai, k ),
zi=g( sigmai, k ),
ci=h( zi, mi),
where: sigma0 is the initial state determined from the key k, f is the next state function, g is the function which produces the keystream zi, and h is the output function which combines the keystream and the plaintext to produce the ciphertext ci.

Properties of synchronous stream ciphers

  • Both the sender and the receiver must be synchronized, eg. using the same key and position in that key.
  • No error propagation, a modified ciphertext digit (not deleted) has no effect on other digits in the ciphertext
  • Active attacks:
    Because of the first property, the insertion, deletion, or replay of ciphertext digits by an active adversary causes immediate loss of synchronization.
    An active attacker might possibly attack select ciphertext digits and know exactly what effect those changes have on the plaintext.
Many of these are Additive Stream Ciphers

Log in or registerto write something here or to contact authors.