Dragon (cipher)
From Wikipedia, the free encyclopedia
Dragon is a stream cipher developed at the Information Security Institute by Ed Dawson, Kevin Chen, Matt Henricksen, William Millan, Leonie Simpson, HoonJae Leem, and SangJae Moon.
The cipher is a Phase 2 Focus candidate for the eSTREAM project. The cipher is targeted for fast software implementations and versions with different key lengths exists. The version selected for Phase 2 is Dragon-128. It is not patented.
Dragon has not been successfully attacked to date, but Cho and Pieprzyk found biases within the primary non-linear component of the cipher [1]. This suggests that the security of the cipher is weaker than intended by its designers.
[edit] External links
Algorithms: A5/1 | A5/2 | E0 | FISH | Grain | HC-256 | ISAAC | LILI-128 | MUGI | Panama | Phelix | Pike | Py | Rabbit | RC4 | Salsa20 | Scream | SEAL | SOBER | SOBER-128 | SOSEMANUK | Trivium | VEST | WAKE |
Theory: Shift register | LFSR | NLFSR | Shrinking generator | T-function | IV |
Standardization: eSTREAM |
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography |
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers |