Abstract:Technologies of cryptography, especially encryption technologies are the core of information security. At first, the principle and category of stream cipher is introduced briefly, then its designing rule and the testing criterion are addressed. Furthermor