Definitions
from Wiktionary, Creative Commons Attribution/Share-Alike License.
- noun cryptography A
stream ofrandom orpseudorandom characters that are combined with theplaintext to produce aciphertext .
Etymologies
from Wiktionary, Creative Commons Attribution/Share-Alike License
Support
Help support Wordnik (and make this page ad-free) by adopting the word keystream.
Examples
-
Tiltman gave this long stretch of keystream to Tutte.
-
Wireless: WPA TKIP RC4 keystream discovery attack (For learning purpose)
-
John Tiltman, Bletchley Park's top code-breaker, broke both messages and recovered the enciphering keystream generated by the
-
This allows the keystream -- the cryptographic overlay used to encrypt data as it flows, not the network key itself -- to be recovered and used to "replay" arbitrary data, such as a changed packet.
-
While TKIP includes replay protection, the graduate students found that the QoS queues would let them replay the same keystream, sidestepping this protection.
-
While TKIP includes replay protection, the graduate students found that the QoS queues would let them replay the same keystream, sidestepping this protection.
-
This allows the keystream -- the cryptographic overlay used to encrypt data as it flows, not the network key itself -- to be recovered and used to "replay" arbitrary data, such as a changed packet.
-
It does allow short packets (network data quanta) used typically for network identification purposes to have their encryption keystream recovered: that's the overlay of per-packet encryption derived from a key that two Wi-Fi components use to protect information sent to one another.
-
With a recovered keystream, a single packet of the same length can be sent back into the network (using another flaw) to fool a client (but not an access point).
-
It does allow short packets (network data quanta) used typically for network identification purposes to have their encryption keystream recovered: that's the overlay of per-packet encryption derived from a key that two Wi-Fi components use to protect information sent to one another.
Comments
Log in or sign up to get involved in the conversation. It's quick and easy.