Knowledge (XXG)

WAKE (cipher)

Source 📝

943: 971: 99:
Research has indicated that WAKE's design allows for effective chosen plaintext attacks, where an attacker can choose arbitrary plaintexts to be encrypted and analyze the resulting ciphertexts to gain insights into the key or the encryption process. Similarly, chosen ciphertext attacks can also be
108:
While WAKE has been overshadowed by more modern stream ciphers, its study remains relevant in cryptographic research. Ongoing analyses focus on its security properties and potential improvements to mitigate identified vulnerabilities. For instance, some studies have proposed modifications to the
923: 753: 606: 224: 469: 1008: 32: 599: 531: 217: 46: 802: 526: 516: 592: 210: 1032: 918: 873: 686: 113:
structure or alternative feedback mechanisms to enhance resistance against chosen plaintext and ciphertext attacks.
797: 500: 359: 1001: 913: 122: 903: 893: 748: 495: 73: 1027: 898: 888: 691: 651: 644: 634: 629: 69: 639: 946: 792: 738: 567: 541: 394: 100:
executed, where an attacker can manipulate ciphertexts and observe the corresponding plaintext outputs.
994: 908: 832: 562: 671: 490: 92:
attacks. These vulnerabilities arise from the cipher's reliance on previous ciphertext blocks for
777: 761: 708: 557: 837: 827: 698: 978: 163: 772: 339: 459: 454: 429: 303: 847: 767: 728: 676: 661: 521: 374: 329: 1021: 928: 883: 842: 822: 718: 681: 656: 434: 414: 404: 369: 233: 28: 878: 723: 713: 703: 666: 615: 20: 88:. However, it has been found to be vulnerable to both chosen plaintext and chosen 857: 409: 267: 84:
WAKE is noted for its speed, making it suitable for applications requiring fast
817: 787: 782: 743: 536: 89: 85: 54: 807: 449: 379: 313: 189: 93: 50: 970: 852: 812: 262: 308: 282: 257: 733: 399: 364: 334: 298: 444: 110: 58: 464: 439: 389: 384: 252: 247: 126: 96:
generation, which can be exploited in certain attack scenarios.
588: 206: 424: 419: 272: 62: 982: 754:
Cryptographically secure pseudorandom number generator
194: 866: 622: 550: 509: 483: 352: 322: 291: 281: 240: 1002: 600: 218: 8: 1009: 995: 607: 593: 585: 288: 225: 211: 203: 199: 195: 977:This cryptography-related article is a 137: 68:The cipher is fast, but vulnerable to 7: 967: 965: 158: 156: 154: 981:. You can help Knowledge (XXG) by 164:"WAKE (cipher) | Semantic Scholar" 14: 80:Characteristics and vulnerability 969: 942: 941: 190:A Bulk Data Encryption Algorithm 803:Information-theoretic security 1: 517:block ciphers in stream mode 919:Message authentication code 874:Cryptographic hash function 687:Cryptographic hash function 148:, Second Edition, page 402. 1049: 964: 798:Harvest now, decrypt later 501:alternating step generator 937: 914:Post-quantum cryptography 584: 202: 198: 74:chosen ciphertext attacks 904:Quantum key distribution 894:Authenticated encryption 749:Random number generation 496:self-shrinking generator 40:Word Auto Key Encryption 899:Public-key cryptography 889:Symmetric-key algorithm 692:Key derivation function 652:Cryptographic primitive 645:Authentication protocol 635:Outline of cryptography 630:History of cryptography 168:www.semanticscholar.org 61:with 256 entries of 32- 640:Cryptographic protocol 42:. The cipher works in 793:End-to-end encryption 739:Cryptojacking malware 568:stream cipher attacks 57:blocks. WAKE uses an 53:blocks from previous 909:Quantum cryptography 833:Trusted timestamping 563:correlation immunity 146:Applied Cryptography 672:Cryptographic nonce 491:shrinking generator 241:Widely used ciphers 104:Recent developments 1033:Cryptography stubs 778:Subliminal channel 762:Pseudorandom noise 709:Key (cryptography) 558:correlation attack 990: 989: 959: 958: 955: 954: 838:Key-based routing 828:Trapdoor function 699:Digital signature 580: 579: 576: 575: 348: 347: 1040: 1011: 1004: 997: 973: 966: 945: 944: 773:Insecure channel 609: 602: 595: 586: 289: 227: 220: 213: 204: 200: 196: 178: 177: 175: 174: 160: 149: 144:Bruce Schneier, 142: 70:chosen plaintext 38:WAKE stands for 1048: 1047: 1043: 1042: 1041: 1039: 1038: 1037: 1018: 1017: 1016: 1015: 962: 960: 951: 933: 862: 618: 613: 572: 546: 505: 479: 344: 318: 277: 236: 231: 186: 181: 172: 170: 162: 161: 152: 143: 139: 135: 119: 106: 82: 44:cipher feedback 17: 12: 11: 5: 1046: 1044: 1036: 1035: 1030: 1028:Stream ciphers 1020: 1019: 1014: 1013: 1006: 999: 991: 988: 987: 974: 957: 956: 953: 952: 950: 949: 938: 935: 934: 932: 931: 926: 924:Random numbers 921: 916: 911: 906: 901: 896: 891: 886: 881: 876: 870: 868: 864: 863: 861: 860: 855: 850: 848:Garlic routing 845: 840: 835: 830: 825: 820: 815: 810: 805: 800: 795: 790: 785: 780: 775: 770: 768:Secure channel 765: 759: 758: 757: 746: 741: 736: 731: 729:Key stretching 726: 721: 716: 711: 706: 701: 696: 695: 694: 689: 679: 677:Cryptovirology 674: 669: 664: 662:Cryptocurrency 659: 654: 649: 648: 647: 637: 632: 626: 624: 620: 619: 614: 612: 611: 604: 597: 589: 582: 581: 578: 577: 574: 573: 571: 570: 565: 560: 554: 552: 548: 547: 545: 544: 539: 534: 529: 524: 522:shift register 519: 513: 511: 507: 506: 504: 503: 498: 493: 487: 485: 481: 480: 478: 477: 472: 467: 462: 457: 452: 447: 442: 437: 432: 427: 422: 417: 412: 407: 402: 397: 392: 387: 382: 377: 372: 367: 362: 356: 354: 350: 349: 346: 345: 343: 342: 337: 332: 326: 324: 320: 319: 317: 316: 311: 306: 301: 295: 293: 286: 279: 278: 276: 275: 270: 265: 260: 255: 250: 244: 242: 238: 237: 234:Stream ciphers 232: 230: 229: 222: 215: 207: 193: 192: 185: 184:External links 182: 180: 179: 150: 136: 134: 131: 130: 129: 118: 115: 105: 102: 81: 78: 15: 13: 10: 9: 6: 4: 3: 2: 1045: 1034: 1031: 1029: 1026: 1025: 1023: 1012: 1007: 1005: 1000: 998: 993: 992: 986: 984: 980: 975: 972: 968: 963: 948: 940: 939: 936: 930: 929:Steganography 927: 925: 922: 920: 917: 915: 912: 910: 907: 905: 902: 900: 897: 895: 892: 890: 887: 885: 884:Stream cipher 882: 880: 877: 875: 872: 871: 869: 865: 859: 856: 854: 851: 849: 846: 844: 843:Onion routing 841: 839: 836: 834: 831: 829: 826: 824: 823:Shared secret 821: 819: 816: 814: 811: 809: 806: 804: 801: 799: 796: 794: 791: 789: 786: 784: 781: 779: 776: 774: 771: 769: 766: 763: 760: 755: 752: 751: 750: 747: 745: 742: 740: 737: 735: 732: 730: 727: 725: 722: 720: 719:Key generator 717: 715: 712: 710: 707: 705: 702: 700: 697: 693: 690: 688: 685: 684: 683: 682:Hash function 680: 678: 675: 673: 670: 668: 665: 663: 660: 658: 657:Cryptanalysis 655: 653: 650: 646: 643: 642: 641: 638: 636: 633: 631: 628: 627: 625: 621: 617: 610: 605: 603: 598: 596: 591: 590: 587: 583: 569: 566: 564: 561: 559: 556: 555: 553: 549: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 514: 512: 508: 502: 499: 497: 494: 492: 489: 488: 486: 482: 476: 473: 471: 468: 466: 463: 461: 458: 456: 453: 451: 448: 446: 443: 441: 438: 436: 433: 431: 428: 426: 423: 421: 418: 416: 413: 411: 408: 406: 403: 401: 398: 396: 393: 391: 388: 386: 383: 381: 378: 376: 373: 371: 368: 366: 363: 361: 358: 357: 355: 353:Other ciphers 351: 341: 338: 336: 333: 331: 328: 327: 325: 321: 315: 312: 310: 307: 305: 302: 300: 297: 296: 294: 290: 287: 284: 280: 274: 271: 269: 266: 264: 261: 259: 256: 254: 251: 249: 246: 245: 243: 239: 235: 228: 223: 221: 216: 214: 209: 208: 205: 201: 197: 191: 188: 187: 183: 169: 165: 159: 157: 155: 151: 147: 141: 138: 132: 128: 124: 121: 120: 116: 114: 112: 103: 101: 97: 95: 91: 87: 79: 77: 75: 71: 66: 64: 60: 56: 52: 49:, generating 48: 45: 41: 36: 34: 33:David Wheeler 30: 29:stream cipher 26: 22: 16:Stream cipher 983:expanding it 976: 961: 879:Block cipher 724:Key schedule 714:Key exchange 704:Kleptography 667:Cryptosystem 616:Cryptography 474: 171:. Retrieved 167: 145: 140: 107: 98: 83: 67: 43: 39: 37: 31:designed by 24: 21:cryptography 18: 867:Mathematics 858:Mix network 1022:Categories 818:Ciphertext 788:Decryption 783:Encryption 744:Ransomware 537:T-function 484:Generators 360:Achterbahn 173:2024-07-19 133:References 90:ciphertext 86:encryption 55:ciphertext 808:Plaintext 450:SOBER-128 380:KCipher-2 314:SOSEMANUK 285:Portfolio 94:keystream 51:keystream 35:in 1993. 947:Category 853:Kademlia 813:Codetext 756:(CSPRNG) 323:Hardware 292:Software 263:Crypto-1 117:See also 623:General 551:Attacks 340:Trivium 309:Salsa20 283:eSTREAM 65:words. 734:Keygen 510:Theory 460:Turing 455:Spritz 430:Scream 400:Phelix 395:Panama 365:F-FCSR 335:MICKEY 304:Rabbit 299:HC-128 258:ChaCha 764:(PRN) 532:NLFSR 445:SOBER 375:ISAAC 330:Grain 111:S-box 59:S-box 27:is a 979:stub 527:LFSR 475:WAKE 470:VMPC 465:VEST 440:SNOW 435:SEAL 425:RC4A 420:RC4+ 415:QUAD 405:Pike 390:ORYX 385:MUGI 370:FISH 253:A5/2 248:A5/1 127:XTEA 72:and 47:mode 25:WAKE 273:RC4 123:TEA 63:bit 19:In 1024:: 542:IV 410:Py 268:E0 166:. 153:^ 125:, 76:. 23:, 1010:e 1003:t 996:v 985:. 608:e 601:t 594:v 226:e 219:t 212:v 176:.

Index

cryptography
stream cipher
David Wheeler
mode
keystream
ciphertext
S-box
bit
chosen plaintext
chosen ciphertext attacks
encryption
ciphertext
keystream
S-box
TEA
XTEA



"WAKE (cipher) | Semantic Scholar"
A Bulk Data Encryption Algorithm
v
t
e
Stream ciphers
A5/1
A5/2
ChaCha
Crypto-1
E0

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.