FACTOID # 27: If you're itching to live in a trailer park, hitch up your home and head to South Carolina, where a whopping 18% of residences are mobile homes.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > ESTREAM

eSTREAM is a project to identify "new stream ciphers that might become suitable for widespread adoption", organised by the EU ECRYPT network. It was set up as a result of the failure of all six stream ciphers submitted to the NESSIE project. The call for primitives was first issued in November 2004. The project is due to complete in May 2008. The project is divided into separate phases and the project goal is to find algorithms suitable for different application profiles. The operation of A5/1, a LFSR-based stream cipher used to encrypt mobile phone conversations. ... ECRYPT (European Network of Excellence for Cryptology) is a 4-year European research initiative launched on 1 February 2004. ... NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000–2003 to identify secure cryptographic primitives. ... shelby was here 2004 (MMIV) was a leap year starting on Thursday of the Gregorian calendar. ... 2008 (MMVIII) will be a leap year starting on Tuesday of the Gregorian calendar. ...

Contents

Profiles

The submissions to eSTREAM fall into either or both of two profiles:

  • Profile 1: "Stream ciphers for software applications with high throughput requirements"
  • Profile 2: "Stream ciphers for hardware applications with restricted resources such as limited storage, gate count, or power consumption."

Both profiles contain an "A" subcategory (1A and 2A) with ciphers that also provide authentication in addition to encryption. Computer software (or simply software) refers to one or more computer programs and data held in the storage of a computer for some purpose. ... In information technology, throughput is the rate at which a computer or network sends or receives data. ... Hardware is the general term that is used to describe physical artifacts of a technology. ... In microprocessor design, gate count refers to the number of transistor switches, or gates, that are needed to implement a design. ...


Phases

Phase 1

Phase 1 included a general analysis of all submissions with the purpose of selecting a subset of the submitted designs for further scrutiny. The designs were scrutinized based on criteria of security, performance (with respect to the block cipher standard AES, as well as the other candidates), simplicity and flexibility, justification and supporting analysis, and clarity and completeness of the documentation. Submissions in Profile 1 were only be accepted if they demonstrated software performance superior to AES-128 in counter mode. Encryption Decryption In cryptography, a block cipher is a symmetric key cipher which operates on fixed-length groups of bits, termed blocks, with an unvarying transformation. ... In cryptography, the Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government. ... In cryptography, a block cipher operates on blocks of fixed length, often 64 or 128 bits. ...


The Phase 1 activities included a large amount of analysis and presentations of analysis results as well as discussion. Also the project developed a framework for testing the performance of the candidates. The framework was then used to benchmark the candidates on a wide variety of systems.


Phase 2

On 27 March 2006 the eSTREAM project officially announced the end of Phase 1. On 1 August 2006 Phase 2 was officially started. For each of the profiles a number of algorithms has been selected to be Focus Phase 2 algorithms. These are designs that eSTREAM finds of particular interest and encourages more cryptanalysis and performance evaluation on these algorithms. Additionally a number of algorithms for each profile are accepted as Phase 2 algorithms, meaning that they are still valid as eSTREAM candidates. The Focus 2 candidates will be re-classified every six months. March 27 is the 86th day of the year in the Gregorian calendar (87th in leap years). ... For the Manfred Mann album, see 2006 (album). ... August 1 is the 213th day of the year (214th in leap years) in the Gregorian calendar. ... For the Manfred Mann album, see 2006 (album). ...


Phase 3

Phase 3 started in April 2007. Candidates for Profile 1 (Software) are CryptMT (Version 3), Dragon, HC (HC-128 and HC-256), LEX (LEX-128, LEX-192 and LEX-256), NLS (NLSv2, encryption only not authentication), Rabbit, Salsa20 and SOSEMANUK. Candidates for Profile 2 (Hardware) are DECIM (DECIM v2 and DECIM-128), Edon80, F-FCSR (F-FCSR-H v2 and F-FCSR-16), Grain (Grain v1 and Grain-128), MICKEY (MICKEY 2.0 and MICKEY-128 2.0), Moustique, Pomaranch (Version 3) and Trivium. 2007 (MMVII) is the current year, a common year starting on Monday of the Gregorian calendar and the AD/CE era. ...


Submissions

Key
F a "Focus Phase 2" cipher
2 A "Phase 2" cipher
A An "archived" cipher
M Includes a MAC
P Patented

A cryptographic message authentication code (MAC) is a short piece of information used to authenticate a message. ...

Selected as focus candidates

Cipher eSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
Properties Submitters
Dragon [1] F Ed Dawson, Kevin Chen, Matt Henricksen,
William Millan, Leonie Simpson, HoonJae Lee,
SangJae Moon
Grain [2] F Martin Hell, Thomas Johansson and Willi Meier
HC-256 [3] F Hongjun Wu
LEX [4] F 2 Alex Biryukov
MICKEY-128 [5] F Steve Babbage and Matthew Dodd
Phelix [6] F F M Doug Whiting, Bruce Schneier, Stefan Lucks
and Frédéric Muller
Py [7] F Eli Biham and Jennifer Seberry
Salsa20 [8] F 2 Daniel Bernstein
SOSEMANUK [9] F Come Berbain, Olivier Billet, Anne Canteaut,
Nicolas Courtois, Henri Gilbert, Louis Goubin,
Aline Gouget, Louis Granboulan, Cédric Lauradoux,
Marine Minier, Thomas Pornin and Hervé Sibert
Trivium [10] F Christophe De Cannière and Bart Preneel

Dragon is a stream cipher developed by Ed Dawson, Kevin Chen, Matt Henricksen, William Millan, Leonie Simpson, HoonJae Leem, and SangJae Moon. ... Grain is a stream cipher designed for restricted hardware environments and submitted to eSTREAM in 2004 by Martin Hell, Thomas Johansson and Willi Meier. ... HC-256 is a stream cipher designed to provide bulk encryption in software at high speeds while permitting strong confidence in its security. ... LEX is a stream cipher based on the round transformation of AES. LEX provides the same key agility and short message block performance as AES while handling longer messages faster than AES. In addition, it has the same hardware and software flexibility as AES, and hardware implementations of LEX can... Alex Biryukov is a cryptographer, currently an assistant professor at the University of Luxembourg. ... MICKEY-128 is a stream cipher developed by Steve Babbage and Matthew Dodd. ... Phelix is a high-speed stream cipher with a built-in single-pass message authentication code (MAC) functionality, submitted in 2004 to the eSTREAM contest by Doug Whiting, Bruce Schneier, Stefan Lucks, and Frédéric Muller. ... Bruce Schneier Bruce Schneier (born January 15, 1963) is an American cryptographer, computer security specialist, and writer. ... Stefan Lucks is a cryptographer and cryptanalyst most well known for his attack on Triple DES, and for extending Lars Knudsens Square attack to Twofish a cipher outside the Square family, thus founding integral cryptanalysis. ... Py is a stream cipher submitted to eSTREAM by Eli Biham and Jennifer Seberry. ... Eli Biham is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department. ... Jennifer Seberry is Professor and Former Head, Department of Computer Science and the Director at the Centre for Computer Security Research at University of Wollongong, Australia. ... Salsa20 is a stream cipher submitted to eSTREAM by Daniel Bernstein. ... Daniel Julius Bernstein (sometimes known simply as djb) is a professor at the University of Illinois at Chicago, a mathematician, a cryptologist, and a programmer. ... The SOSEMANUK cipher is a Synchronous Stream Cipher developed by Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. ... Nicolas Courtois is a cryptographer who works on cryptosystems and cryptographic attacks based on multivariate polynomial equations over finite fields. ... Trivium cipher structure Trivium is a simple synchronous stream cipher that can be implemented in estimated 3488 to 5504 ASIC gates. ... Bart Preneel is a Belgian cryptographer and cryptanalyst. ...

Selected as Phase 2 candidates but not as focus candidates

Cipher eSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
Properties Submitters
ABC [11] 2 Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov
and Sandeep Kumar
Achterbahn [12] 2 Berndt Gammel, Rainer Göttfert and Oliver Kniffler
CryptMT [13] 2 P Makoto Matsumoto, Hagita Mariko, Takuji Nishimura
and Matsuo Saito
DECIM [14] 2 P Come Berbain, Olivier Billet, Anne Canteaut,
Nicolas Courtois, Blandine Debraize, Henri Gilbert,
Louis Goubin, Aline Gouget, Louis Granboulan,
Cédric Lauradoux, Marine Minier, Thomas Pornin
and Hervé Sibert
DICING [15] 2 Li An-Ping
Edon80 [16] 2 Danilo Gligoroski, Smile Markovski, Ljupco Kocarev
and Marjan Gusev
F-FCSR [17] A 2 Thierry Berger, François Arnault and Cédric Lauradoux
Hermes8 [18] A 2 Ulrich Kaiser
MICKEY [19] 2 Steve Babbage and Matthew Dodd
MOSQUITO [20] 2 Joan Daemen and Paris Kitsos
NLS [21] 2 2 Gregory Rose, Philip Hawkes, Michael Paddon
and Miriam Wiggers de Vries
Polar Bear [22] 2 2 Johan Håstad and Mats Näslund
Pomaranch [23] A 2 Cees Jansen and Alexander Kolosha
Rabbit [24] 2 2 P Martin Boesgaard, Mette Vesterager, Thomas Christensen
and Erik Zenner
SFINKS [25] 2 M An Braeken, Joseph Lano, Nele Mentens,
Bart Preneel and Ingrid Verbauwhede
TSC-3 [26] 2 Jin Hong, Dong Hoon Lee, Yongjin Yeom,
Daewan Han and Seongtaek Chee
VEST [27] 2 MP Sean O'Neil, Benjamin Gittins and Howard Landman
WG [28] 2 Guang Gong and Yassir Nawaz
Yamb [29] 2 2 LAN Crypto
ZK-Crypt [30] 2 MP Carmi Gressel, Ran Granot and Gabi Vago

In cryptography, ABC is a stream cypher algorithm developed by Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov, and Sandeep Kumar. ... In cryptography, Achterbahn is the name of a stream cypher algorithm submitted to the eSTREAM Project of the eCRYPT network. ... In cryptography, CryptMT is a stream cypher algorithm which internally uses the Mersenne twister. ... In cryptography, DECIM is a stream cypher algorithm designed by Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert. ... Dicing is a method of food preparation in which the food item is cut into small blocks or dice. ... In cryptography, Edon80 is a stream cypher algorithm designed by Danilo Gligoroski, Smile Markovski, Ljupco Kocarev, and Marjan Gusev. ... In cryptography, F-FCSR is a stream cypher algorithm developed by Thierry Berger, François Arnault, and Cédric Lauradoux. ... In cryptography, Hermes8 is the name of a stream cypher algorithm designed by Ulrich Kaiser. ... Look up Mickey in Wiktionary, the free dictionary. ... Diversity 41 genera Genera See text. ... Joan Daemen (born 1965) is a Belgian cryptographer and one of the designers of Rijndael, the Advanced Encryption Standard (AES), together with Vincent Rijmen. ... In cryptography, NLS is a stream cypher algorithm designed by Gregory Rose, Philip Hawkes, MIchael Paddon, and Miriam Wiggers de Vries. ... In cryptography, Polar Bear is a stream cypher algorithm designed by Johan Håstad and Mats Näslund. ... In cryptography, CJCSG is a stream cypher algorithm developed by Cees Jansen and Alexander Kolosha. ... Rabbit is a high-speed stream cipher first presented[1] in February 2003 at the 10th FSE workshop. ... In cryptography, SFINKS is a stream cypher algorithm developed by An Braeken, Joseph Lano, Nele Mentens, Bart Preneel, and Ingrid Verbauwhede. ... Bart Preneel is a Belgian cryptographer and cryptanalyst. ... In cryptography, TSC-3 is a stream cypher algorithm developed by Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han, and Seongtaek Chee. ... VEST (Very Efficient Substitution Transposition) ciphers are a set of families of general-purpose hardware-dedicated ciphers that support single pass authenticated encryption and can operate as collision-resistant hash functions. ... In cryptography, WG is a stream cypher algorithm developed by Guang Gong and Yassir Nawaz. ... In cryptography, Yamb is a stream cypher algorithm developed by LAN Crypto. ... In cryptography, ZK-Crypt is a stream cypher developed by Carmi Gressel, Ran Granot, and Gabi Vago and has been patented. ...

Not selected as focus or Phase 2 candidates

Cipher eSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
Properties Submitters
Frogbit [31] A MP Thierry Moreau
Fubuki [32] A P Makoto Matsumoto, Hagita Mariko, Takuji Nishimura
and Matsuo Saito
MAG [33] A A Rade Vuckovac
Mir-1 [34] A Alexander Maximov
SSS [35] A A M Gregory Rose, Philip Hawkes, Michael Paddon
and Miriam Wiggers de Vries
TRBDK3 YAEA [36] A A Timothy Brigham

In cryptography, Frogbit is a stream cypher algorithm developed by Thierry Moreau and is patented. ... In cryptography, CryptMT is a stream cypher algorithm which internally uses the Mersenne twister. ... In cryptography, MAG is stream cipher algorithm debveloped by Rade Vuckovac. ... In cryptography, Mir-1 is a stream cypher algorithm developed by Alexander Maximov. ... In cryptography, SSS is a stream cypher algorithm developed by Gregory Rose, Philip Hawkes, Michael Paddon, and Miriam Wiggers de Vries. ... In cryptography, TRBDK3 YAEA is a stream cypher algorithm developed by Timothy Brigham. ...

See also

On January 2, 1997 the National Institute of Standards and Technology, or NIST, called for cryptographers to propose a new standard block cipher for United States Government use in non_classified but sensitive applications. ... NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000–2003 to identify secure cryptographic primitives. ... CRYPTREC is the Cryptography Research and Evaluation Committee set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use. ...

External links

Stream ciphers
v  d  e
Algorithms: A5/1 | A5/2 | E0 | FISH | Grain | HC-256 | ISAAC | LILI-128 | MUGI | Panama | Phelix | Pike | Py | Rabbit | RC4 | Salsa20 | Scream | SEAL | SOBER | SOBER-128 | SOSEMANUK | Trivium | VEST | WAKE
Theory: Shift register | LFSR | NLFSR | Shrinking generator | T-function | IV
Standardization: eSTREAM
Cryptography
v  d  e
History of cryptography | Cryptanalysis | Cryptography portal | Topics in cryptography
Symmetric-key algorithm | Block cipher | Stream cipher | Public-key cryptography | Cryptographic hash function | Message authentication code | Random numbers

  Results from FactBites:
 
eSTREAM - The ECRYPT Stream Cipher Project - Phase 3 (224 words)
This is the home page for eSTREAM, the ECRYPT Stream Cipher Project.
This is a multi-year effort to identify new stream ciphers that might become suitable for widespread adoption.
The eSTREAM Phase 2 report is available here.
ESTREAM - Wikipedia, the free encyclopedia (474 words)
eSTREAM is a project to identify "new stream ciphers that might become suitable for widespread adoption", organised by the EU ECRYPT network.
It was set up as a result of the failure of all six stream ciphers submitted to the NESSIE project.
On 27 March 2006 the eSTREAM project officially announced the end of Phase 1.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m