An Optimal Binary Message Protocol for Streaming Bits


A stream-based cryptographic protocol (One Time Pad or Stream Cipher) uses a bitstream of internal states or a keystream to encrypt a bitstream of plaintext message. The security of the message depends on the size of the bitstream of the internal state or keystream used as every bit of plaintext would be encrypted with a corresponding bit from a keystream or internal state. In the event that the message is small in size (weak message), the keystream or internal state would also be weak. Cryptanalysis via the message length would be plausible and the application of bruteforce attacks would not be too far fetched for a weak message. The successful bruteforcing and revelation of possible message, keys or cipher states used to encrypt the message may allow other attacks to propagate and further reducing security of the message stream. In this paper, I would like to define the security of a stream-based encrypted message with the formula of 2^n where the n represents the bit length of the message. Using the concept of how a block cipher encrypts data in blocks, messages can be made stronger to discourage bruteforce on a stream-based message.

Download Paper (PDF)
PGP Signature

Publication Info
Written On: 11 Nov 2014
Revised On: 30 Nov 2014
Published On: 26th Dec 2014
Author: Thoth