January 22, 2002
Practical Aspects of Modern Cryptography
48
Stream Ciphers
nUse the secret key as a seed to a pseudo-random number-generator. nTake the stream of output bits from the PRNG and XOR it with the plaintext to form the ciphertext.