Movatterモバイル変換


[0]ホーム

URL:


Jump to content
WikipediaThe Free Encyclopedia
Search

eSTREAM

From Wikipedia, the free encyclopedia
Project to identify new stream ciphers for widespread adoption
This article has multiple issues. Please helpimprove it or discuss these issues on thetalk page.(Learn how and when to remove these messages)
This articlerelies excessively onreferences toprimary sources. Please improve this article by addingsecondary or tertiary sources.
Find sources: "ESTREAM" – news ·newspapers ·books ·scholar ·JSTOR
(April 2015) (Learn how and when to remove this message)
This articlemay be too technical for most readers to understand. Pleasehelp improve it tomake it understandable to non-experts, without removing the technical details.(June 2023) (Learn how and when to remove this message)
The topic of this articlemay not meet Wikipedia'sgeneral notability guideline. Please help to demonstrate the notability of the topic by citingreliable secondary sources that areindependent of the topic and provide significant coverage of it beyond a mere trivial mention. If notability cannot be shown, the article is likely to bemerged,redirected, ordeleted.
Find sources: "ESTREAM" – news ·newspapers ·books ·scholar ·JSTOR
(June 2023) (Learn how and when to remove this message)
(Learn how and when to remove this message)

eSTREAM is a project to "identify newstream ciphers suitable for widespread adoption",[1][2] organised by theEUECRYPT network. It was set up as a result of the failure of all six stream ciphers submitted to theNESSIE project. The call for primitives was first issued in November 2004. The project was completed in April 2008. The project was divided into separate phases and the project goal was to find algorithms suitable for different application profiles.

Profiles

[edit]

The submissions to eSTREAM fall into either or both of two profiles:

  • Profile 1: "Stream ciphers forsoftware applications with highthroughput requirements"
  • Profile 2: "Stream ciphers for hardware applications with restricted resources such as limited storage,gate count, or power consumption."

Both profiles contain an "A" subcategory (1A and 2A) with ciphers that also provide authentication in addition to encryption. In Phase 3 none of the ciphers providing authentication are being considered (The NLS cipher had authentication removed from it to improve its performance).

eSTREAM portfolio

[edit]

As of September 2011[update] the following ciphers make up the eSTREAM portfolio:[3]

Profile 1 (software)Profile 2 (hardware)
HC-128[1]Archived 2012-07-01 at theWayback MachineGrain[2]Archived 2008-10-06 at theWayback Machine
Rabbit[3]Archived 2012-06-13 at theWayback MachineMICKEY[4]Archived 2012-07-01 at theWayback Machine
Salsa20/12[5]Archived 2016-04-05 at theWayback MachineTrivium[6]Archived 2015-09-23 at theWayback Machine
SOSEMANUK[7]Archived 2012-04-14 at theWayback Machine

These are all free for any use. Rabbit was the only one that had a patent pending during the eStream competition, but it was released into the public domain in October 2008.[4]

The original portfolio, published at the end of Phase 3, consisted of the above ciphers plusF-FCSR which was in Profile 2.[5] However,cryptanalysis of F-FCSR[6] led to a revision of the portfolio in September 2008 which removed that cipher.

Phases

[edit]

Phase 1

[edit]

Phase 1 included a general analysis of all submissions with the purpose of selecting a subset of the submitted designs for further scrutiny. The designs were scrutinized based on criteria of security, performance (with respect to theblock cipherAES—a US Government approved standard, as well as the other candidates), simplicity and flexibility, justification and supporting analysis, and clarity and completeness of the documentation. Submissions in Profile 1 were only accepted if they demonstrated software performance superior to AES-128 incounter mode.

Activities in Phase 1 included a large amount of analysis and presentations of analysis results as well as discussion. The project also developed a framework for testing the performance of the candidates. The framework was then used to benchmark the candidates on a wide variety of systems.

On 27 March 2006, the eSTREAM project officially announced the end of Phase 1.

Phase 2

[edit]

On 1 August 2006, Phase 2 was officially started. For each of the profiles, a number of algorithms has been selected to be Focus Phase 2 algorithms. These are designs that eSTREAM finds of particular interest and encourages more cryptanalysis and performance evaluation on these algorithms. Additionally a number of algorithms for each profile are accepted as Phase 2 algorithms, meaning that they are still valid as eSTREAM candidates. The Focus 2 candidates will be re-classified every six months.

Phase 3

[edit]

Phase 3 started in April 2007. Candidates for Profile 1 (software) were:

Candidates for Profile 2 (hardware) were:

Phase 3 ended on 15 April 2008, with the announcement of the candidates that had been selected for the final eSTREAM portfolio. The selected algorithms were:

  • For Profile 1: HC-128, Rabbit, Salsa20/12, and SOSEMANUK.
  • For Profile 2: F-FCSR-H v2, Grain v1, Mickey v2, and Trivium.

Submissions

[edit]
Key
PIn the eSTREAM profile
PFormerly in the eSTREAM profile
3A "Phase 3" cipher
Fa "Focus Phase 2" cipher
2A "Phase 2" cipher
AAn "archived" cipher
MIncludes aMAC
patPatented or patent pending; some uses require a license
patWaspat, now free for any use

In eSTREAM portfolio

[edit]

The eSTREAM portfolio ciphers are, as of January 2012[update]:[7]

Profile 1
(software)
Profile 2
(hardware)
128-bit key80-bit key
HC-128Grain v1
RabbitMICKEY 2.0
Salsa20/12Trivium
SOSEMANUK-

Versions of the eSTREAM portfolio ciphers that support extended key lengths:

Profile 1
(software)
Profile 2
(hardware)
256-bit key128-bit key
HC-256-
-MICKEY-128 2.0
Salsa20/12-
--

Note that the 128-bit version of Grain v1 is no longer supported by its designers and has been replaced by Grain-128a. Grain-128a is not considered to be part of the eSTREAM portfolio.

As of December 2008[update]:

CiphereSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
PropertiesSubmitters
Grain[8]Archived 2012-07-01 at theWayback MachinePFMartin Hell, Thomas Johansson and Willi Meier
HC-256 (HC-128, HC-256)[9]Archived 2012-07-01 at theWayback MachinePFHongjun Wu
MICKEY (MICKEY 2.0, MICKEY-128 2.0)[10]Archived 2012-07-01 at theWayback MachinePFSteve Babbage and Matthew Dodd
Rabbit[11]Archived 2012-07-01 at theWayback MachineP2pat[4]Martin Boesgaard, Mette Vesterager, Thomas Christensen and Erik Zenner
Salsa20[12]Archived 2012-07-01 at theWayback MachinePF2Daniel J. Bernstein
SOSEMANUK[13]Archived 2012-07-01 at theWayback MachinePCome Berbain, Olivier Billet,Anne Canteaut,
Nicolas Courtois, Henri Gilbert, Louis Goubin,
Aline Gouget, Louis Granboulan, Cédric Lauradoux,
Marine Minier, Thomas Pornin and Hervé Sibert
Trivium[14]Archived 2012-06-26 at theWayback MachinePFChristophe De Cannière andBart Preneel

No longer in eSTREAM portfolio

[edit]

This cipher was in the original portfolio but was removed in revision 1, published in September 2008.

CiphereSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
PropertiesSubmitters
F-FCSR (F-FCSR-H v2, F-FCSR-16)[15]Archived 2012-07-01 at theWayback MachinePThierry Berger, François Arnault and Cédric Lauradoux

Selected as Phase 3 candidates but not for the portfolio

[edit]
CiphereSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
PropertiesSubmitters
CryptMT (version 3)[16]Archived 2012-06-18 at theWayback Machine3patMakoto Matsumoto, Hagita Mariko, Takuji Nishimura
and Matsuo Saito
DECIM (DECIM v2, DECIM-128)[17]Archived 2012-07-01 at theWayback Machine3patCome Berbain, Olivier Billet, Anne Canteaut,
Nicolas Courtois, Blandine Debraize, Henri Gilbert,
Louis Goubin, Aline Gouget, Louis Granboulan,
Cédric Lauradoux, Marine Minier, Thomas Pornin
and Hervé Sibert
Dragon[18]Archived 2012-07-01 at theWayback Machine3FEd Dawson, Kevin Chen, Matt Henricksen,
William Millan, Leonie Simpson, HoonJae Lee,
SangJae Moon
Edon80[19]Archived 2012-09-04 at theWayback Machine3Danilo Gligoroski, Smile Markovski, Ljupco Kocarev
and Marjan Gusev
LEX[20]Archived 2012-07-01 at theWayback Machine3F2Alex Biryukov
MOSQUITO (aka Moustique)[21]Archived 2012-07-01 at theWayback Machine3Joan Daemen and Paris Kitsos
NLS (NLSv2, encryption-only)[22]Archived 2012-07-01 at theWayback Machine3Gregory Rose, Philip Hawkes, Michael Paddon
and Miriam Wiggers de Vries
Pomaranch (version 3)[23]Archived 2012-07-01 at theWayback Machine3Tor Helleseth, Cees Jansen and Alexander Kolosha

Selected as Phase 2 focus candidates but not as Phase 3 candidates

[edit]
CiphereSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
PropertiesSubmitters
Phelix[24]Archived 2012-07-01 at theWayback MachineFFMDoug Whiting,Bruce Schneier,Stefan Lucks
andFrédéric Muller
Py[25]Archived 2012-07-01 at theWayback MachineFEli Biham andJennifer Seberry

Selected as Phase 2 candidates but not as focus or Phase 3 candidates

[edit]
CiphereSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
PropertiesSubmitters
ABC[26]Archived 2012-07-01 at theWayback Machine2Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov
and Sandeep Kumar
Achterbahn[27]Archived 2012-07-01 at theWayback Machine2Berndt Gammel, Rainer Göttfert and Oliver Kniffler
DICING[28]Archived 2012-07-01 at theWayback Machine2Li An-Ping
Hermes8[29]Archived 2012-07-01 at theWayback MachineA2Ulrich Kaiser
NLS[30]Archived 2012-07-01 at theWayback Machine22Gregory Rose, Philip Hawkes, Michael Paddon
and Miriam Wiggers de Vries
Polar Bear[31]Archived 2012-07-01 at theWayback Machine22Johan Håstad and Mats Näslund
Pomaranch[32]Archived 2012-07-01 at theWayback MachineA2Cees Jansen and Alexander Kolosha
SFINKS[33][permanent dead link]2MAn Braeken, Joseph Lano, Nele Mentens,
Bart Preneel and Ingrid Verbauwhede
TSC-3[34]Archived 2012-07-01 at theWayback Machine2Jin Hong, Dong Hoon Lee, Yongjin Yeom,
Daewan Han and Seongtaek Chee
VEST[35]Archived 2016-03-04 at theWayback Machine2M patSean O'Neil, Benjamin Gittins andHoward Landman
WG[36]2Guang Gong and Yassir Nawaz
Yamb[37][permanent dead link]22LAN Crypto
ZK-Crypt[38][permanent dead link]2M patCarmi Gressel, Ran Granot and Gabi Vago

Not selected as focus or Phase 2 candidates

[edit]
CiphereSTREAM
webpage
Profile 1
(software)
Profile 2
(hardware)
PropertiesSubmitters
Frogbit[39]Archived 2012-07-01 at theWayback MachineAM patThierry Moreau
Fubuki[40]Archived 2012-07-01 at theWayback MachineApatMakoto Matsumoto, Hagita Mariko, Takuji Nishimura
and Matsuo Saito
MAG[41]Archived 2012-07-01 at theWayback MachineAARade Vuckovac
Mir-1[42]Archived 2012-07-01 at theWayback MachineAAlexander Maximov
SSS[43]Archived 2012-07-01 at theWayback MachineAAMGregory Rose, Philip Hawkes, Michael Paddon
and Miriam Wiggers de Vries
TRBDK3 YAEA[44]Archived 2012-07-01 at theWayback MachineAATimothy Brigham

See also

[edit]

References

[edit]
  1. ^"ECRYPT Call for Stream Cipher Primitives" (version 1.3 ed.). 12 April 2005. Archived fromthe original on 17 July 2012. Retrieved2 April 2014.
  2. ^Vincent Rijmen (2010-01-01)."Stream Ciphers and the eSTREAM Project"(PDF).
  3. ^"The eSTREAM Portfolio (rev. 1)"(PDF). Archived fromthe original(PDF) on 2012-08-13. Retrieved2008-10-01.
  4. ^abArchived copyArchived 2009-06-30 at theWayback Machine
  5. ^"The eSTREAM Project - eSTREAM Phase 3".www.ecrypt.eu.org.
  6. ^M. Hell and T. Johansson. Breaking the F-FCSR-H stream cipher in Real Time.In J. Pieprzyk, editor, Proceedings of Asiacrypt 2008, Lecture Notes in ComputerScience, to appear.
  7. ^"ECRYPT II"(PDF). Archived fromthe original(PDF) on 18 October 2012. Retrieved23 March 2013.

External links

[edit]
Widely used ciphers
eSTREAM Portfolio
Software
Hardware
Other ciphers
Generators
Theory
Attacks
General
Mathematics
Retrieved from "https://en.wikipedia.org/w/index.php?title=ESTREAM&oldid=1272748632"
Categories:
Hidden categories:

[8]ページ先頭

©2009-2025 Movatter.jp