Which of the following encryption algorithms are based on stream ciphers?