Encryption algorithms -- Part 4: Stream ciphers