![]() | This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages) (Learn how and when to remove this message)
|
eSTREAM is a project to "identify newstream ciphers suitable for widespread adoption",[1][2] organised by theEUECRYPT network. It was set up as a result of the failure of all six stream ciphers submitted to theNESSIE project. The call for primitives was first issued in November 2004. The project was completed in April 2008. The project was divided into separate phases and the project goal was to find algorithms suitable for different application profiles.
The submissions to eSTREAM fall into either or both of two profiles:
Both profiles contain an "A" subcategory (1A and 2A) with ciphers that also provide authentication in addition to encryption. In Phase 3 none of the ciphers providing authentication are being considered (The NLS cipher had authentication removed from it to improve its performance).
As of September 2011[update] the following ciphers make up the eSTREAM portfolio:[3]
Profile 1 (software) | Profile 2 (hardware) |
---|---|
HC-128[1]Archived 2012-07-01 at theWayback Machine | Grain[2]Archived 2008-10-06 at theWayback Machine |
Rabbit[3]Archived 2012-06-13 at theWayback Machine | MICKEY[4]Archived 2012-07-01 at theWayback Machine |
Salsa20/12[5]Archived 2016-04-05 at theWayback Machine | Trivium[6]Archived 2015-09-23 at theWayback Machine |
SOSEMANUK[7]Archived 2012-04-14 at theWayback Machine |
These are all free for any use. Rabbit was the only one that had a patent pending during the eStream competition, but it was released into the public domain in October 2008.[4]
The original portfolio, published at the end of Phase 3, consisted of the above ciphers plusF-FCSR which was in Profile 2.[5] However,cryptanalysis of F-FCSR[6] led to a revision of the portfolio in September 2008 which removed that cipher.
Phase 1 included a general analysis of all submissions with the purpose of selecting a subset of the submitted designs for further scrutiny. The designs were scrutinized based on criteria of security, performance (with respect to theblock cipherAES—a US Government approved standard, as well as the other candidates), simplicity and flexibility, justification and supporting analysis, and clarity and completeness of the documentation. Submissions in Profile 1 were only accepted if they demonstrated software performance superior to AES-128 incounter mode.
Activities in Phase 1 included a large amount of analysis and presentations of analysis results as well as discussion. The project also developed a framework for testing the performance of the candidates. The framework was then used to benchmark the candidates on a wide variety of systems.
On 27 March 2006, the eSTREAM project officially announced the end of Phase 1.
On 1 August 2006, Phase 2 was officially started. For each of the profiles, a number of algorithms has been selected to be Focus Phase 2 algorithms. These are designs that eSTREAM finds of particular interest and encourages more cryptanalysis and performance evaluation on these algorithms. Additionally a number of algorithms for each profile are accepted as Phase 2 algorithms, meaning that they are still valid as eSTREAM candidates. The Focus 2 candidates will be re-classified every six months.
Phase 3 started in April 2007. Candidates for Profile 1 (software) were:
Candidates for Profile 2 (hardware) were:
Phase 3 ended on 15 April 2008, with the announcement of the candidates that had been selected for the final eSTREAM portfolio. The selected algorithms were:
Key | |
---|---|
P | In the eSTREAM profile |
Formerly in the eSTREAM profile | |
3 | A "Phase 3" cipher |
F | a "Focus Phase 2" cipher |
2 | A "Phase 2" cipher |
A | An "archived" cipher |
M | Includes aMAC |
pat | Patented or patent pending; some uses require a license |
Waspat, now free for any use |
The eSTREAM portfolio ciphers are, as of January 2012[update]:[7]
Profile 1 (software) | Profile 2 (hardware) |
---|---|
128-bit key | 80-bit key |
HC-128 | Grain v1 |
Rabbit | MICKEY 2.0 |
Salsa20/12 | Trivium |
SOSEMANUK | - |
Versions of the eSTREAM portfolio ciphers that support extended key lengths:
Profile 1 (software) | Profile 2 (hardware) |
---|---|
256-bit key | 128-bit key |
HC-256 | - |
- | MICKEY-128 2.0 |
Salsa20/12 | - |
- | - |
Note that the 128-bit version of Grain v1 is no longer supported by its designers and has been replaced by Grain-128a. Grain-128a is not considered to be part of the eSTREAM portfolio.
As of December 2008[update]:
Cipher | eSTREAM webpage | Profile 1 (software) | Profile 2 (hardware) | Properties | Submitters |
---|---|---|---|---|---|
Grain | [8]Archived 2012-07-01 at theWayback Machine | PF | Martin Hell, Thomas Johansson and Willi Meier | ||
HC-256 (HC-128, HC-256) | [9]Archived 2012-07-01 at theWayback Machine | PF | Hongjun Wu | ||
MICKEY (MICKEY 2.0, MICKEY-128 2.0) | [10]Archived 2012-07-01 at theWayback Machine | PF | Steve Babbage and Matthew Dodd | ||
Rabbit | [11]Archived 2012-07-01 at theWayback Machine | P | 2 | Martin Boesgaard, Mette Vesterager, Thomas Christensen and Erik Zenner | |
Salsa20 | [12]Archived 2012-07-01 at theWayback Machine | PF | 2 | Daniel J. Bernstein | |
SOSEMANUK | [13]Archived 2012-07-01 at theWayback Machine | P | Come Berbain, Olivier Billet,Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert | ||
Trivium | [14]Archived 2012-06-26 at theWayback Machine | PF | Christophe De Cannière andBart Preneel |
This cipher was in the original portfolio but was removed in revision 1, published in September 2008.
Cipher | eSTREAM webpage | Profile 1 (software) | Profile 2 (hardware) | Properties | Submitters |
---|---|---|---|---|---|
F-FCSR (F-FCSR-H v2, F-FCSR-16) | [15]Archived 2012-07-01 at theWayback Machine | Thierry Berger, François Arnault and Cédric Lauradoux |
Cipher | eSTREAM webpage | Profile 1 (software) | Profile 2 (hardware) | Properties | Submitters |
---|---|---|---|---|---|
CryptMT (version 3) | [16]Archived 2012-06-18 at theWayback Machine | 3 | pat | Makoto Matsumoto, Hagita Mariko, Takuji Nishimura and Matsuo Saito | |
DECIM (DECIM v2, DECIM-128) | [17]Archived 2012-07-01 at theWayback Machine | 3 | pat | Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert | |
Dragon | [18]Archived 2012-07-01 at theWayback Machine | 3F | Ed Dawson, Kevin Chen, Matt Henricksen, William Millan, Leonie Simpson, HoonJae Lee, SangJae Moon | ||
Edon80 | [19]Archived 2012-09-04 at theWayback Machine | 3 | Danilo Gligoroski, Smile Markovski, Ljupco Kocarev and Marjan Gusev | ||
LEX | [20]Archived 2012-07-01 at theWayback Machine | 3F | 2 | Alex Biryukov | |
MOSQUITO (aka Moustique) | [21]Archived 2012-07-01 at theWayback Machine | 3 | Joan Daemen and Paris Kitsos | ||
NLS (NLSv2, encryption-only) | [22]Archived 2012-07-01 at theWayback Machine | 3 | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries | ||
Pomaranch (version 3) | [23]Archived 2012-07-01 at theWayback Machine | 3 | Tor Helleseth, Cees Jansen and Alexander Kolosha |
Cipher | eSTREAM webpage | Profile 1 (software) | Profile 2 (hardware) | Properties | Submitters |
---|---|---|---|---|---|
Phelix | [24]Archived 2012-07-01 at theWayback Machine | F | F | M | Doug Whiting,Bruce Schneier,Stefan Lucks andFrédéric Muller |
Py | [25]Archived 2012-07-01 at theWayback Machine | F | Eli Biham andJennifer Seberry |
Cipher | eSTREAM webpage | Profile 1 (software) | Profile 2 (hardware) | Properties | Submitters |
---|---|---|---|---|---|
ABC | [26]Archived 2012-07-01 at theWayback Machine | 2 | Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov and Sandeep Kumar | ||
Achterbahn | [27]Archived 2012-07-01 at theWayback Machine | 2 | Berndt Gammel, Rainer Göttfert and Oliver Kniffler | ||
DICING | [28]Archived 2012-07-01 at theWayback Machine | 2 | Li An-Ping | ||
Hermes8 | [29]Archived 2012-07-01 at theWayback Machine | A | 2 | Ulrich Kaiser | |
NLS | [30]Archived 2012-07-01 at theWayback Machine | 2 | 2 | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries | |
Polar Bear | [31]Archived 2012-07-01 at theWayback Machine | 2 | 2 | Johan Håstad and Mats Näslund | |
Pomaranch | [32]Archived 2012-07-01 at theWayback Machine | A | 2 | Cees Jansen and Alexander Kolosha | |
SFINKS | [33][permanent dead link] | 2 | M | An Braeken, Joseph Lano, Nele Mentens, Bart Preneel and Ingrid Verbauwhede | |
TSC-3 | [34]Archived 2012-07-01 at theWayback Machine | 2 | Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han and Seongtaek Chee | ||
VEST | [35]Archived 2016-03-04 at theWayback Machine | 2 | M pat | Sean O'Neil, Benjamin Gittins andHoward Landman | |
WG | [36] | 2 | Guang Gong and Yassir Nawaz | ||
Yamb | [37][permanent dead link] | 2 | 2 | LAN Crypto | |
ZK-Crypt | [38][permanent dead link] | 2 | M pat | Carmi Gressel, Ran Granot and Gabi Vago |
Cipher | eSTREAM webpage | Profile 1 (software) | Profile 2 (hardware) | Properties | Submitters |
---|---|---|---|---|---|
Frogbit | [39]Archived 2012-07-01 at theWayback Machine | A | M pat | Thierry Moreau | |
Fubuki | [40]Archived 2012-07-01 at theWayback Machine | A | pat | Makoto Matsumoto, Hagita Mariko, Takuji Nishimura and Matsuo Saito | |
MAG | [41]Archived 2012-07-01 at theWayback Machine | A | A | Rade Vuckovac | |
Mir-1 | [42]Archived 2012-07-01 at theWayback Machine | A | Alexander Maximov | ||
SSS | [43]Archived 2012-07-01 at theWayback Machine | A | A | M | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries |
TRBDK3 YAEA | [44]Archived 2012-07-01 at theWayback Machine | A | A | Timothy Brigham |