ESTREAM

From Wikipedia, the free encyclopedia

The correct title of this article is eSTREAM. The initial letter is shown capitalized due to technical restrictions.

eSTREAM is a project to identify "new stream ciphers that might become suitable for widespread adoption", organised by the EU ECRYPT network. It was set up as a result of the failure of all six stream ciphers submitted to the NESSIE project. The call for primitives was first issued in November 2004. The project is due to complete in January 2008. The project is divided into separate phases and the project goal is to find algorithms suitable for different application profiles.

Contents

[edit] Profiles

The submissions to eSTREAM fall into either or both of two profiles:

  • Profile 1: "Stream ciphers for software applications with high throughput requirements"
  • Profile 2: "Stream ciphers for hardware applications with restricted resources such as limited storage, gate count, or power consumption."

Both profiles contain an "A" subcategory (1A and 2A) with ciphers that also provide authentication in addition to encryption.

[edit] Phases

[edit] Phase 1

Phase 1 included a general analysis of all submissions with the purpose of selecting a subset of the submitted designs for further scrutiny. The designs were scrutinized based on criteria of security, performance (with respect to the block cipher standard AES, as well as the other candidates), simplicity and flexibility, justification and supporting analysis, and clarity and completeness of the documentation. Submissions in Profile 1 were only be accepted if they demonstrated software performance superior to AES-128 in counter mode.

The Phase 1 activities included a large amount of analysis and presentations of analysis results as well as discussion. Also the project developed a framework for testing the performance of the candidates. The framework was then used to benchmark the candidates on a wide variety of systems.

[edit] Phase 2

On 27 March 2006 the eSTREAM project officially announced the end of Phase 1. On 1 August 2006 Phase 2 was officially started. For each of the profiles a number of algorithms has been selected to be Focus Phase 2 algorithms. These are designs that eSTREAM finds of particular interest and encourages more cryptanalysis and performance evaluation on these algorithms. Additionally a number of algorithms for each profile are accepted as Phase 2 algorithms, meaning that they are still valid as eSTREAM candidates. The Focus 2 candidates will be re-classified every six months.

[edit] Submissions

Key
F a "Focus Phase 2" cipher
2 A "Phase 2" cipher
A An "archived" cipher
M Includes a MAC
P Patented

[edit] Selected as focus candidates

Cipher eSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
Properties Submitters
Dragon [1] F Ed Dawson, Kevin Chen, Matt Henricksen,
William Millan, Leonie Simpson, HoonJae Lee,
SangJae Moon
Grain [2] F Martin Hell, Thomas Johansson and Willi Meier
HC-256 [3] F Hongjun Wu
LEX [4] F 2 Alex Biryukov
MICKEY-128 [5] F Steve Babbage and Matthew Dodd
Phelix [6] F F M Doug Whiting, Bruce Schneier, Stefan Lucks
and Frédéric Muller
Py [7] F Eli Biham and Jennifer Seberry
Salsa20 [8] F 2 Daniel Bernstein
SOSEMANUK [9] F Come Berbain, Olivier Billet, Anne Canteaut,
Nicolas Courtois, Henri Gilbert, Louis Goubin,
Aline Gouget, Louis Granboulan, Cédric Lauradoux,
Marine Minier, Thomas Pornin and Hervé Sibert
Trivium [10] F Christophe De Cannière and Bart Preneel

[edit] Selected as Phase 2 candidates but not as focus candidates

Cipher eSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
Properties Submitters
ABC [11] 2 Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov
and Sandeep Kumar
Achterbahn [12] 2 Berndt Gammel, Rainer Göttfert and Oliver Kniffler
CryptMT [13] 2 P Makoto Matsumoto, Hagita Mariko, Takuji Nishimura
and Matsuo Saito
DECIM [14] 2 P Come Berbain, Olivier Billet, Anne Canteaut,
Nicolas Courtois, Blandine Debraize, Henri Gilbert,
Louis Goubin, Aline Gouget, Louis Granboulan,
Cédric Lauradoux, Marine Minier, Thomas Pornin
and Hervé Sibert
DICING [15] 2 Li An-Ping
Edon80 [16] 2 Danilo Gligoroski, Smile Markovski, Ljupco Kocarev
and Marjan Gusev
F-FCSR [17] A 2 Thierry Berger, François Arnault and Cédric Lauradoux
Hermes8 [18] A 2 Ulrich Kaiser
MICKEY [19] 2 Steve Babbage and Matthew Dodd
MOSQUITO [20] 2 Joan Daemen and Paris Kitsos
NLS [21] 2 2 Gregory Rose, Philip Hawkes, Michael Paddon
and Miriam Wiggers de Vries
Polar Bear [22] 2 2 Johan Håstad and Mats Näslund
Pomaranch [23] A 2 Cees Jansen and Alexander Kolosha
Rabbit [24] 2 2 P Martin Boesgaard, Mette Vesterager, Thomas Christensen
and Erik Zenner
SFINKS [25] 2 M An Braeken, Joseph Lano, Nele Mentens,
Bart Preneel and Ingrid Verbauwhede
TSC-3 [26] 2 Jin Hong, Dong Hoon Lee, Yongjin Yeom,
Daewan Han and Seongtaek Chee
VEST [27] 2 MP Sean O'Neil, Benjamin Gittins and Howard Landman
WG [28] 2 Guang Gong and Yassir Nawaz
Yamb [29] 2 2 LAN Crypto
ZK-Crypt [30] 2 MP Carmi Gressel, Ran Granot and Gabi Vago

[edit] Not selected as focus or Phase 2 candidates

Cipher eSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
Properties Submitters
Frogbit [31] A MP Thierry Moreau
Fubuki [32] A P Makoto Matsumoto, Hagita Mariko, Takuji Nishimura
and Matsuo Saito
MAG [33] A A Rade Vuckovac
Mir-1 [34] A Alexander Maximov
SSS [35] A A M Gregory Rose, Philip Hawkes, Michael Paddon
and Miriam Wiggers de Vries
TRBDK3 YAEA [36] A A Timothy Brigham

[edit] See also

[edit] External links

Stream ciphers
v  d  e
Algorithms: A5/1 | A5/2 | E0 | FISH | Grain | HC-256 | ISAAC | LILI-128 | MUGI | Panama | Phelix | Pike | Py | Rabbit | RC4 | Salsa20 | Scream | SEAL | SOBER | SOBER-128 | SOSEMANUK | Trivium | VEST | WAKE
Theory: Shift register | LFSR | NLFSR | Shrinking generator | T-function | IV
Standardization: eSTREAM
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers