HOME

TheInfoList



OR:

eSTREAM is a project to "identify new
stream cipher stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream (keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystream ...
s suitable for widespread adoption", organised by the EU
ECRYPT ECRYPT (European Network of Excellence in Cryptology) was a 4-year European research initiative launched on 1 February 2004 with the stated objective of promoting the collaboration of European researchers in information security, and especially in ...
network. It was set up as a result of the failure of all six stream ciphers submitted to the
NESSIE NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000 to 2003 to identify secure cryptographic primitives. The project was comparable to the NIST AES process and the Japanese Gov ...
project. The call for primitives was first issued in November 2004. The project was completed in April 2008. The project was divided into separate phases and the project goal was to find algorithms suitable for different application profiles.


Profiles

The submissions to eSTREAM fall into either or both of two profiles: * Profile 1: "Stream ciphers for
software Software is a set of computer programs and associated documentation and data. This is in contrast to hardware, from which the system is built and which actually performs the work. At the lowest programming level, executable code consists ...
applications with high
throughput Network throughput (or just throughput, when in context) refers to the rate of message delivery over a communication channel, such as Ethernet or packet radio, in a communication network. The data that these messages contain may be delivered ov ...
requirements" * Profile 2: "Stream ciphers for hardware applications with restricted resources such as limited storage,
gate count {{unreferenced, date=December 2015 In microprocessor design, gate count refers to the number of logic gates built with transistors and other electronic devices, that are needed to implement a design. Even with today's processor technology providing ...
, or power consumption." Both profiles contain an "A" subcategory (1A and 2A) with ciphers that also provide authentication in addition to encryption. In Phase 3 none of the ciphers providing authentication are being considered (The NLS cipher had authentication removed from it to improve its performance).


eSTREAM portfolio

the following ciphers make up the eSTREAM portfolio: These are all free for any use. Rabbit was the only one that had a patent pending during the eStream competition, but it was released into the public domain in October 2008. The original portfolio, published at the end of Phase 3, consisted of the above ciphers plus
F-FCSR In cryptography, F-FCSR is a stream cipher developed by Thierry Berger, François Arnault, and Cédric Lauradoux. The core of the cipher is a Feedback with Carry Shift Register (FCSR) automaton, which is similar to a LFSR, but they perform oper ...
which was in Profile 2. However, cryptanalysis of F-FCSR M. Hell and T. Johansson. Breaking the F-FCSR-H stream cipher in Real Time. In J. Pieprzyk, editor, Proceedings of Asiacrypt 2008, Lecture Notes in Computer Science, to appear. led to a revision of the portfolio in September 2008 which removed that cipher.


Phases


Phase 1

Phase 1 included a general analysis of all submissions with the purpose of selecting a subset of the submitted designs for further scrutiny. The designs were scrutinized based on criteria of security, performance (with respect to the block cipher AES—a US Government approved standard, as well as the other candidates), simplicity and flexibility, justification and supporting analysis, and clarity and completeness of the documentation. Submissions in Profile 1 were only accepted if they demonstrated software performance superior to AES-128 in
counter mode In cryptography, a block cipher mode of operation is an algorithm that uses a block cipher to provide information security such as confidentiality or authenticity. A block cipher by itself is only suitable for the secure cryptographic transform ...
. Activities in Phase 1 included a large amount of analysis and presentations of analysis results as well as discussion. The project also developed a framework for testing the performance of the candidates. The framework was then used to benchmark the candidates on a wide variety of systems. On 27 March 2006, the eSTREAM project officially announced the end of Phase 1.


Phase 2

On 1 August 2006, Phase 2 was officially started. For each of the profiles, a number of algorithms has been selected to be Focus Phase 2 algorithms. These are designs that eSTREAM finds of particular interest and encourages more cryptanalysis and performance evaluation on these algorithms. Additionally a number of algorithms for each profile are accepted as Phase 2 algorithms, meaning that they are still valid as eSTREAM candidates. The Focus 2 candidates will be re-classified every six months.


Phase 3

Phase 3 started in April 2007. Candidates for Profile 1 (software) were: *
CryptMT In cryptography, CryptMT is a stream cipher algorithm which internally uses the Mersenne twister. It was developed by Makoto Matsumoto, Mariko Hagita, Takuji Nishimura and Mutsuo Saito and is patented. It has been submitted to the eSTREAM projec ...
(version 3) *
Dragon A dragon is a reptilian legendary creature that appears in the folklore of many cultures worldwide. Beliefs about dragons vary considerably through regions, but dragons in western cultures since the High Middle Ages have often been depicted as ...
* HC (HC-128 and HC-256) *
LEX Lex or LEX may refer to: Arts and entertainment * ''Lex'', a daily featured column in the ''Financial Times'' Games * Lex, the mascot of the word-forming puzzle video game ''Bookworm'' * Lex, the protagonist of the word-forming puzzle video ga ...
(LEX-128, LEX-192 and LEX-256) * NLS (NLSv2, encryption only, not authentication) *
Rabbit Rabbits, also known as bunnies or bunny rabbits, are small mammals in the family Leporidae (which also contains the hares) of the order Lagomorpha (which also contains the pikas). ''Oryctolagus cuniculus'' includes the European rabbit speci ...
*
Salsa20 Salsa20 and the closely related ChaCha are stream ciphers developed by Daniel J. Bernstein. Salsa20, the original cipher, was designed in 2005, then later submitted to the eSTREAM European Union cryptographic validation process by Bernstein. Ch ...
/12 * SOSEMANUK Candidates for Profile 2 (hardware) were: *
DECIM In cryptography, DECIM is a stream cypher algorithm designed by Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thom ...
(DECIM v2 and DECIM-128) *
F-FCSR In cryptography, F-FCSR is a stream cipher developed by Thierry Berger, François Arnault, and Cédric Lauradoux. The core of the cipher is a Feedback with Carry Shift Register (FCSR) automaton, which is similar to a LFSR, but they perform oper ...
(F-FCSR-H v2 and F-FCSR-16) *
Grain A grain is a small, hard, dry fruit (caryopsis) – with or without an attached hull layer – harvested for human or animal consumption. A grain crop is a grain-producing plant. The two main types of commercial grain crops are cereals and legum ...
(Grain v1 and Grain-128) *
MICKEY Mickey is a given name and nickname, almost always masculine and often a short form (hypocorism) of Michael, and occasionally a surname. Notable people and characters with the name include: People Given name or nickname Men * Mickey Andrews (bor ...
(MICKEY 2.0 and MICKEY-128 2.0) *
Moustique ''Moustique'' ( French: ''The Mosquito'') is a weekly news magazine with a special reference to current affairs, culture and television. It has been in circulation since 1924 and is headquartered in Brussels, Belgium. History and profile The ma ...
, Pomaranch (version 3) *
Trivium The trivium is the lower division of the seven liberal arts and comprises grammar, logic, and rhetoric. The trivium is implicit in ''De nuptiis Philologiae et Mercurii'' ("On the Marriage of Philology and Mercury") by Martianus Capella, but t ...
Phase 3 ended on 15 April 2008, with the announcement of the candidates that had been selected for the final eSTREAM portfolio. The selected Profile 1 algorithms were: HC-128, Rabbit, Salsa20/12, and SOSEMANUK. The selected Profile 2 algorithms were: F-FCSR-H v2, Grain v1, Mickey v2, and Trivium.


Submissions


In eSTREAM portfolio

The eSTREAM portfolio ciphers are, : Versions of the eSTREAM portfolio ciphers that support extended key lengths: Note that the 128-bit version of Grain v1 is no longer supported by its designers and has been replaced by Grain-128a. Grain-128a is not considered to be part of the eSTREAM portfolio. :


No longer in eSTREAM portfolio

This cipher was in the original portfolio but was removed in revision 1, published in September 2008.


Selected as Phase 3 candidates but not for the portfolio


Selected as Phase 2 focus candidates but not as Phase 3 candidates


Selected as Phase 2 candidates but not as focus or Phase 3 candidates


Not selected as focus or Phase 2 candidates


See also

*
AES process The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United States (NIST), was chosen using a process lasting from 1997 to 2000 that was markedly more ...
*
CAESAR Competition The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic researchers to encourage the design of authenticated encryption schemes. The competi ...
– Competition to design authenticated encryption schemes *
NESSIE NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000 to 2003 to identify secure cryptographic primitives. The project was comparable to the NIST AES process and the Japanese Gov ...
*
CRYPTREC CRYPTREC is the Cryptography Research and Evaluation Committees set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use. It is comparable in many respects to the European Union's NESSIE ...


References


External links


Homepage for the project
*
Discussion forum
** The eSTREAM testing framewor

** Update 1
(PDF)


by Daniel J. Bernstein {{Cryptography navbox , stream Cryptography contests Research projects Stream ciphers de:Stromverschlüsselung#eSTREAM