Comprehensive Study of Existing Stream Ciphers

0Citations
Citations of this article
6Readers
Mendeley users who have this article in their library.
Get full text

Abstract

Now a day’s internet of things is one of the rapidly growing research field in the information technology domain. Offering security for this ever-augmenting technology is still remaining as the challenging task. Cryptographic techniques are used to authenticate and maintain confidentiality of message data. To maintain the security, system cryptographic algorithms and protocols are very essential. The system is mainly categorized into two groups namely stream cipher and block cipher. Stream cipher has its own advantage over block cipher. In this paper, we reviewed some of the stream ciphers. Selection of finest algorithms for the security of internet of things is very difficult in terms of energy and storage. The study aims to summarize some of the existing stream cipher techniques. This paper gives details on fundamental knowledge about encryption algorithms and its comparison. We also describe the design considerations of stream ciphers.

Cite

CITATION STYLE

APA

Chaithanya, S., & Anitha, V. (2020). Comprehensive Study of Existing Stream Ciphers. In Lecture Notes in Networks and Systems (Vol. 98, pp. 362–373). Springer. https://doi.org/10.1007/978-3-030-33846-6_41

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free