Attacks in Stream Ciphers: A Survey