From: Jonathan Rochkind <jrochkin@cs.oberlin.edu>
To: cypherpunks@toad.com
Message Hash: 38f12f13d270b322d3ed4d29ba8ae5c19fc67321b72e2d186582cd0763ad7a75
Message ID: <199407061721.NAA19360@cs.oberlin.edu>
Reply To: N/A
UTC Datetime: 1994-07-06 17:21:46 UTC
Raw Date: Wed, 6 Jul 94 10:21:46 PDT
From: Jonathan Rochkind <jrochkin@cs.oberlin.edu>
Date: Wed, 6 Jul 94 10:21:46 PDT
To: cypherpunks@toad.com
Subject: stream ciphers and realtime communications?
Message-ID: <199407061721.NAA19360@cs.oberlin.edu>
MIME-Version: 1.0
Content-Type: text/plain
Well, I finally did my duty and picked up a copy of Applied Cryptography. :)
I've only given it a cursory browing so far, but I have a question.
When I first saw reference to stream ciphers in the book, I imagined that they would be ideal for realtime encrypted communications, like voice (in cellular phones, perhaps).
But after reading further, it appears that stream ciphers aren't being used much
in this manner, or much at all.
Is this correct? I know that there are plenty of encryption protocols and methods for
realtime communications (clipper chip, for one), but do they just use block
ciphers with relatively small blocks? (Is the security of such things as RSA
and IDEA effected by size of block? There's got to be a minimum block that works;
you can't do IDEA on a single byte, or can you?)
Can anyone outline what kinds of methods are used for voice encryption and other realtime
methods, as contrasted with email and delayed transfer methods?
Return to July 1994
Return to “schneier@chinet.chinet.com (Bruce Schneier)”