943:
971:
99:
Research has indicated that WAKE's design allows for effective chosen plaintext attacks, where an attacker can choose arbitrary plaintexts to be encrypted and analyze the resulting ciphertexts to gain insights into the key or the encryption process. Similarly, chosen ciphertext attacks can also be
108:
While WAKE has been overshadowed by more modern stream ciphers, its study remains relevant in cryptographic research. Ongoing analyses focus on its security properties and potential improvements to mitigate identified vulnerabilities. For instance, some studies have proposed modifications to the
923:
753:
606:
224:
469:
1008:
32:
599:
531:
217:
46:
802:
526:
516:
592:
210:
1032:
918:
873:
686:
113:
structure or alternative feedback mechanisms to enhance resistance against chosen plaintext and ciphertext attacks.
797:
500:
359:
1001:
913:
122:
903:
893:
748:
495:
73:
1027:
898:
888:
691:
651:
644:
634:
629:
69:
639:
946:
792:
738:
567:
541:
394:
100:
executed, where an attacker can manipulate ciphertexts and observe the corresponding plaintext outputs.
994:
908:
832:
562:
671:
490:
92:
attacks. These vulnerabilities arise from the cipher's reliance on previous ciphertext blocks for
777:
761:
708:
557:
837:
827:
698:
978:
163:
772:
339:
459:
454:
429:
303:
847:
767:
728:
676:
661:
521:
374:
329:
1021:
928:
883:
842:
822:
718:
681:
656:
434:
414:
404:
369:
233:
28:
878:
723:
713:
703:
666:
615:
20:
88:. However, it has been found to be vulnerable to both chosen plaintext and chosen
857:
409:
267:
84:
WAKE is noted for its speed, making it suitable for applications requiring fast
817:
787:
782:
743:
536:
89:
85:
54:
807:
449:
379:
313:
189:
93:
50:
970:
852:
812:
262:
308:
282:
257:
733:
399:
364:
334:
298:
444:
110:
58:
464:
439:
389:
384:
252:
247:
126:
96:
generation, which can be exploited in certain attack scenarios.
588:
206:
424:
419:
272:
62:
982:
754:
Cryptographically secure pseudorandom number generator
194:
866:
622:
550:
509:
483:
352:
322:
291:
281:
240:
1002:
600:
218:
8:
1009:
995:
607:
593:
585:
288:
225:
211:
203:
199:
195:
977:This cryptography-related article is a
137:
68:The cipher is fast, but vulnerable to
7:
967:
965:
158:
156:
154:
981:. You can help Knowledge (XXG) by
164:"WAKE (cipher) | Semantic Scholar"
14:
80:Characteristics and vulnerability
969:
942:
941:
190:A Bulk Data Encryption Algorithm
803:Information-theoretic security
1:
517:block ciphers in stream mode
919:Message authentication code
874:Cryptographic hash function
687:Cryptographic hash function
148:, Second Edition, page 402.
1049:
964:
798:Harvest now, decrypt later
501:alternating step generator
937:
914:Post-quantum cryptography
584:
202:
198:
74:chosen ciphertext attacks
904:Quantum key distribution
894:Authenticated encryption
749:Random number generation
496:self-shrinking generator
40:Word Auto Key Encryption
899:Public-key cryptography
889:Symmetric-key algorithm
692:Key derivation function
652:Cryptographic primitive
645:Authentication protocol
635:Outline of cryptography
630:History of cryptography
168:www.semanticscholar.org
61:with 256 entries of 32-
640:Cryptographic protocol
42:. The cipher works in
793:End-to-end encryption
739:Cryptojacking malware
568:stream cipher attacks
57:blocks. WAKE uses an
53:blocks from previous
909:Quantum cryptography
833:Trusted timestamping
563:correlation immunity
146:Applied Cryptography
672:Cryptographic nonce
491:shrinking generator
241:Widely used ciphers
104:Recent developments
1033:Cryptography stubs
778:Subliminal channel
762:Pseudorandom noise
709:Key (cryptography)
558:correlation attack
990:
989:
959:
958:
955:
954:
838:Key-based routing
828:Trapdoor function
699:Digital signature
580:
579:
576:
575:
348:
347:
1040:
1011:
1004:
997:
973:
966:
945:
944:
773:Insecure channel
609:
602:
595:
586:
289:
227:
220:
213:
204:
200:
196:
178:
177:
175:
174:
160:
149:
144:Bruce Schneier,
142:
70:chosen plaintext
38:WAKE stands for
1048:
1047:
1043:
1042:
1041:
1039:
1038:
1037:
1018:
1017:
1016:
1015:
962:
960:
951:
933:
862:
618:
613:
572:
546:
505:
479:
344:
318:
277:
236:
231:
186:
181:
172:
170:
162:
161:
152:
143:
139:
135:
119:
106:
82:
44:cipher feedback
17:
12:
11:
5:
1046:
1044:
1036:
1035:
1030:
1028:Stream ciphers
1020:
1019:
1014:
1013:
1006:
999:
991:
988:
987:
974:
957:
956:
953:
952:
950:
949:
938:
935:
934:
932:
931:
926:
924:Random numbers
921:
916:
911:
906:
901:
896:
891:
886:
881:
876:
870:
868:
864:
863:
861:
860:
855:
850:
848:Garlic routing
845:
840:
835:
830:
825:
820:
815:
810:
805:
800:
795:
790:
785:
780:
775:
770:
768:Secure channel
765:
759:
758:
757:
746:
741:
736:
731:
729:Key stretching
726:
721:
716:
711:
706:
701:
696:
695:
694:
689:
679:
677:Cryptovirology
674:
669:
664:
662:Cryptocurrency
659:
654:
649:
648:
647:
637:
632:
626:
624:
620:
619:
614:
612:
611:
604:
597:
589:
582:
581:
578:
577:
574:
573:
571:
570:
565:
560:
554:
552:
548:
547:
545:
544:
539:
534:
529:
524:
522:shift register
519:
513:
511:
507:
506:
504:
503:
498:
493:
487:
485:
481:
480:
478:
477:
472:
467:
462:
457:
452:
447:
442:
437:
432:
427:
422:
417:
412:
407:
402:
397:
392:
387:
382:
377:
372:
367:
362:
356:
354:
350:
349:
346:
345:
343:
342:
337:
332:
326:
324:
320:
319:
317:
316:
311:
306:
301:
295:
293:
286:
279:
278:
276:
275:
270:
265:
260:
255:
250:
244:
242:
238:
237:
234:Stream ciphers
232:
230:
229:
222:
215:
207:
193:
192:
185:
184:External links
182:
180:
179:
150:
136:
134:
131:
130:
129:
118:
115:
105:
102:
81:
78:
15:
13:
10:
9:
6:
4:
3:
2:
1045:
1034:
1031:
1029:
1026:
1025:
1023:
1012:
1007:
1005:
1000:
998:
993:
992:
986:
984:
980:
975:
972:
968:
963:
948:
940:
939:
936:
930:
929:Steganography
927:
925:
922:
920:
917:
915:
912:
910:
907:
905:
902:
900:
897:
895:
892:
890:
887:
885:
884:Stream cipher
882:
880:
877:
875:
872:
871:
869:
865:
859:
856:
854:
851:
849:
846:
844:
843:Onion routing
841:
839:
836:
834:
831:
829:
826:
824:
823:Shared secret
821:
819:
816:
814:
811:
809:
806:
804:
801:
799:
796:
794:
791:
789:
786:
784:
781:
779:
776:
774:
771:
769:
766:
763:
760:
755:
752:
751:
750:
747:
745:
742:
740:
737:
735:
732:
730:
727:
725:
722:
720:
719:Key generator
717:
715:
712:
710:
707:
705:
702:
700:
697:
693:
690:
688:
685:
684:
683:
682:Hash function
680:
678:
675:
673:
670:
668:
665:
663:
660:
658:
657:Cryptanalysis
655:
653:
650:
646:
643:
642:
641:
638:
636:
633:
631:
628:
627:
625:
621:
617:
610:
605:
603:
598:
596:
591:
590:
587:
583:
569:
566:
564:
561:
559:
556:
555:
553:
549:
543:
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
514:
512:
508:
502:
499:
497:
494:
492:
489:
488:
486:
482:
476:
473:
471:
468:
466:
463:
461:
458:
456:
453:
451:
448:
446:
443:
441:
438:
436:
433:
431:
428:
426:
423:
421:
418:
416:
413:
411:
408:
406:
403:
401:
398:
396:
393:
391:
388:
386:
383:
381:
378:
376:
373:
371:
368:
366:
363:
361:
358:
357:
355:
353:Other ciphers
351:
341:
338:
336:
333:
331:
328:
327:
325:
321:
315:
312:
310:
307:
305:
302:
300:
297:
296:
294:
290:
287:
284:
280:
274:
271:
269:
266:
264:
261:
259:
256:
254:
251:
249:
246:
245:
243:
239:
235:
228:
223:
221:
216:
214:
209:
208:
205:
201:
197:
191:
188:
187:
183:
169:
165:
159:
157:
155:
151:
147:
141:
138:
132:
128:
124:
121:
120:
116:
114:
112:
103:
101:
97:
95:
91:
87:
79:
77:
75:
71:
66:
64:
60:
56:
52:
49:, generating
48:
45:
41:
36:
34:
33:David Wheeler
30:
29:stream cipher
26:
22:
16:Stream cipher
983:expanding it
976:
961:
879:Block cipher
724:Key schedule
714:Key exchange
704:Kleptography
667:Cryptosystem
616:Cryptography
474:
171:. Retrieved
167:
145:
140:
107:
98:
83:
67:
43:
39:
37:
31:designed by
24:
21:cryptography
18:
867:Mathematics
858:Mix network
1022:Categories
818:Ciphertext
788:Decryption
783:Encryption
744:Ransomware
537:T-function
484:Generators
360:Achterbahn
173:2024-07-19
133:References
90:ciphertext
86:encryption
55:ciphertext
808:Plaintext
450:SOBER-128
380:KCipher-2
314:SOSEMANUK
285:Portfolio
94:keystream
51:keystream
35:in 1993.
947:Category
853:Kademlia
813:Codetext
756:(CSPRNG)
323:Hardware
292:Software
263:Crypto-1
117:See also
623:General
551:Attacks
340:Trivium
309:Salsa20
283:eSTREAM
65:words.
734:Keygen
510:Theory
460:Turing
455:Spritz
430:Scream
400:Phelix
395:Panama
365:F-FCSR
335:MICKEY
304:Rabbit
299:HC-128
258:ChaCha
764:(PRN)
532:NLFSR
445:SOBER
375:ISAAC
330:Grain
111:S-box
59:S-box
27:is a
979:stub
527:LFSR
475:WAKE
470:VMPC
465:VEST
440:SNOW
435:SEAL
425:RC4A
420:RC4+
415:QUAD
405:Pike
390:ORYX
385:MUGI
370:FISH
253:A5/2
248:A5/1
127:XTEA
72:and
47:mode
25:WAKE
273:RC4
123:TEA
63:bit
19:In
1024::
542:IV
410:Py
268:E0
166:.
153:^
125:,
76:.
23:,
1010:e
1003:t
996:v
985:.
608:e
601:t
594:v
226:e
219:t
212:v
176:.
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.