1 00:00:01,160 --> 00:00:04,140 Stream ciphers are an alternative to block ciphers. 2 00:00:06,170 --> 00:00:14,720 RC 4 is a good example of a stream cipher this code has also been developed by Ron reversed. 3 00:00:14,920 --> 00:00:19,780 If you configure the previous three modes in such a way that shifts are single bit the result would 4 00:00:19,780 --> 00:00:25,580 be a stream cypher block sizes one bit. 5 00:00:25,790 --> 00:00:31,140 The blocks are encrypted bit by bit using a long key. 6 00:00:31,200 --> 00:00:36,960 There are some ciphers that employ a mode of operation that is exactly like that. 7 00:00:37,060 --> 00:00:40,870 They are frequently used for transmissions. 8 00:00:40,890 --> 00:00:46,650 One of the most popular applications of for it was the point of point Tamplin protocol the method used 9 00:00:46,650 --> 00:00:52,990 in Microsoft implementations of virtual private networks. 10 00:00:53,180 --> 00:01:02,900 RC 4 was developed in 1987 and its operating principle was disclosed in 1994. 11 00:01:03,020 --> 00:01:09,620 RC for exhibits a striking similarity to the perfect one time pad cipher. 12 00:01:09,780 --> 00:01:15,040 The difference is that you have to lengthen that key artificially. 13 00:01:15,540 --> 00:01:16,220 It's it's 14 00:01:20,500 --> 00:01:24,270 even though the algorithm itself has been tested and regarded as secure. 15 00:01:24,520 --> 00:01:32,460 Implementing it can cause problems all earlier versions of Microsoft Office are a good example of RC 16 00:01:32,460 --> 00:01:34,100 for implementation problems 17 00:01:37,150 --> 00:01:41,290 in other instances the operating system SAM file. 18 00:01:41,400 --> 00:01:45,300 We talked about this before. 19 00:01:45,350 --> 00:01:51,540 You've probably noticed that if you're using Office 97 or Office 2003 you have the ability to encrypt 20 00:01:51,570 --> 00:01:53,840 Word Excel and Powerpoint files 21 00:01:56,650 --> 00:02:01,630 the RC for Cypher was the default cipher used for this. 22 00:02:01,660 --> 00:02:07,330 There is a huge amount of tools for retrieving forgotten office passwords on the Internet. 23 00:02:07,330 --> 00:02:09,220 They are very affordable. 24 00:02:09,220 --> 00:02:11,290 Why is that. 25 00:02:11,410 --> 00:02:18,470 The basic problem Marsi foreheads is that you shouldn't reuse the key to encrypt the same message the 26 00:02:18,520 --> 00:02:20,650 Ekso our operation is performed there. 27 00:02:20,960 --> 00:02:26,390 But if the key is re-used an attacker can reverse the ex-SO or and disclose some information on the 28 00:02:26,390 --> 00:02:28,550 plaintext and the keys as well. 29 00:02:31,030 --> 00:02:36,940 It's easy to see that if you encrypt the same data multiple times using R-S.C. for if the kids the same 30 00:02:37,550 --> 00:02:43,900 the ciphertext will be the same each time Microsoft implementations use the same key every time 31 00:02:47,970 --> 00:02:50,460 and now will briefly tell you about the operation 32 00:02:53,100 --> 00:02:59,870 at first a keystream has to be generated then the keystream needs to be combined with the original plaintext 33 00:02:59,870 --> 00:03:03,280 using the x or operation. 34 00:03:03,380 --> 00:03:09,350 After this process is completed the result is very much like the one time Pead except the keystream 35 00:03:09,350 --> 00:03:11,990 here has lesser entropy than that perfect cipher 36 00:03:14,770 --> 00:03:22,810 to generate the cipher you need a secret and initial state the initial state is usually generated by 37 00:03:22,810 --> 00:03:33,410 a permutation of the 256 state box and 2 8 bit index pointers once the vectors A keystream initial state 38 00:03:33,410 --> 00:03:37,380 is generated it can be made longer to match the length of the plaintext.