Synchronous Stream: this form of stream cipher, the cipher key stream generator is dependent on the base key
used for encryption, this is shown in Figure 5; how the synchronous stream works, where the sender uses only
the shared base key to encrypt the stream that is going out, while the receiver uses the same shared key to decrypt
the key. The downside to this method is that if the key is known by a third party, the whole system is
compromised.