Beruflich Dokumente
Kultur Dokumente
which is then XORed with the plaintext (if encrypting) or XORed with
the ciphertext (if decrypting).
Although this may seem like a complicated way to generate a single
keystream bit, A5/1 is easily implemented in hardware and can
generate bits at a rate proportional to the clock speed. Also, the
number of keystream bits that can be generated from a single 64-bit
key is virtually unlimited—though eventually the keystream will repeat.
TheA5/1 algorithm has a simple “wiring diagram” representation, as
illustrated in Figure 3.1.
See [26] for more discussion of A5/1.
The A5/1 algorithm is representative of a large class of ciphers that are
based on
shift registers and implemented in hardware. These systems were once
the kings of symmetric key crypto, but in recent years the block cipher
has clearly taken over that title. And where a stream cipher is used
today, it is likely to be RC4, which we’ll discuss next.
Historically, shift register based stream ciphers were needed in order
to keep pace with bit streams (such as audio) that are produced at a
relatively high data rate. In the past, software-based crypto could not
generate bits fast enough for such applications.
Today, however, there are few applications for which software-based
crypto
is not appropriate. This is one of the primary reasons why block ciphers
are on the ascendancy.