ESTREAM: Difference between revisions
m Dating maintenance tags: {{Technical}} |
Removing link(s) to "Yamb": Removing links to deleted page Yamb. |
||
(9 intermediate revisions by 9 users not shown) | |||
Line 6: | Line 6: | ||
}} |
}} |
||
{{lowercase title|title=eSTREAM}} |
{{lowercase title|title=eSTREAM}} |
||
'''eSTREAM''' is a project to "identify new [[stream cipher]]s suitable for widespread adoption",<ref>{{cite web|url=http://www.ecrypt.eu.org/stream/call/ |title=ECRYPT Call for Stream Cipher Primitives |edition=version 1.3 |date=12 April 2005 |access-date=2 April 2014}}</ref> organised by the [[European Union|EU]] [[ECRYPT]] network. It was set up as a result of the failure of all six stream ciphers submitted to the [[NESSIE]] project. The call for primitives was first issued in November 2004. The project was completed in April 2008. The project was divided into separate phases and the project goal was to find algorithms suitable for different application profiles. |
'''eSTREAM''' is a project to "identify new [[stream cipher]]s suitable for widespread adoption",<ref>{{cite web |url=http://www.ecrypt.eu.org/stream/call/ |title=ECRYPT Call for Stream Cipher Primitives |edition=version 1.3 |date=12 April 2005 |access-date=2 April 2014 |archive-date=17 July 2012 |archive-url=https://web.archive.org/web/20120717061847/http://www.ecrypt.eu.org/stream/call/ |url-status=dead }}</ref><ref>{{cite web |author1=[[Vincent Rijmen]] |date=2010-01-01 |title=Stream Ciphers and the eSTREAM Project |url=https://www.isecure-journal.com/article_39173_a7fab575ea1ea7b6dffe12d5a226ced8.pdf }}</ref> organised by the [[European Union|EU]] [[ECRYPT]] network. It was set up as a result of the failure of all six stream ciphers submitted to the [[NESSIE]] project. The call for primitives was first issued in November 2004. The project was completed in April 2008. The project was divided into separate phases and the project goal was to find algorithms suitable for different application profiles. |
||
==Profiles== |
==Profiles== |
||
Line 17: | Line 17: | ||
==eSTREAM portfolio== |
==eSTREAM portfolio== |
||
{{As of|2011|09}} the following ciphers make up the eSTREAM portfolio:<ref>{{Cite web|url=http://www.ecrypt.eu.org/stream/portfolio_revision1.pdf|title=The eSTREAM Portfolio (rev. 1)}}</ref> |
{{As of|2011|09}} the following ciphers make up the eSTREAM portfolio:<ref>{{Cite web|url=http://www.ecrypt.eu.org/stream/portfolio_revision1.pdf|title=The eSTREAM Portfolio (rev. 1)|access-date=2008-10-01|archive-date=2012-08-13|archive-url=https://web.archive.org/web/20120813111955/http://www.ecrypt.eu.org/stream/portfolio_revision1.pdf|url-status=dead}}</ref> |
||
{|class="wikitable" |
{|class="wikitable" |
||
Line 23: | Line 23: | ||
! '''Profile 2''' (hardware) |
! '''Profile 2''' (hardware) |
||
|- |
|- |
||
| [[HC-256|HC-128]] [http://www.ecrypt.eu.org/stream/hcpf.html] <!-- prof1 --> |
| [[HC-256|HC-128]] [http://www.ecrypt.eu.org/stream/hcpf.html] {{Webarchive|url=https://web.archive.org/web/20120701140440/http://www.ecrypt.eu.org/stream/hcpf.html |date=2012-07-01 }} <!-- prof1 --> |
||
| [[Grain (cipher)|Grain]] [http://www.ecrypt.eu.org/stream/grainpf.html] <!-- prof2 --> |
| [[Grain (cipher)|Grain]] [http://www.ecrypt.eu.org/stream/grainpf.html] {{Webarchive|url=https://web.archive.org/web/20081006130843/http://www.ecrypt.eu.org/stream/grainpf.html |date=2008-10-06 }} <!-- prof2 --> |
||
|- |
|- |
||
| [[Rabbit (cipher)|Rabbit]] [http://www.ecrypt.eu.org/stream/rabbitpf.html] <!-- prof1 --> |
| [[Rabbit (cipher)|Rabbit]] [http://www.ecrypt.eu.org/stream/rabbitpf.html] {{Webarchive|url=https://web.archive.org/web/20120613193629/http://www.ecrypt.eu.org/stream/rabbitpf.html |date=2012-06-13 }} <!-- prof1 --> |
||
| [[MICKEY]] [http://www.ecrypt.eu.org/stream/mickeypf.html] <!-- prof2 --> |
| [[MICKEY]] [http://www.ecrypt.eu.org/stream/mickeypf.html] {{Webarchive|url=https://web.archive.org/web/20120701140451/http://www.ecrypt.eu.org/stream/mickeypf.html |date=2012-07-01 }} <!-- prof2 --> |
||
|- |
|- |
||
| [[Salsa20]]/12<!-- *** Salsa20/12 is the final, accepted version, please see http://www.ecrypt.eu.org/stream/index.html and http://www.ecrypt.eu.org/stream/portfolio.pdf (read section 2 and the part of section 3 titled "Salsa20/12" *** --> [http://www.ecrypt.eu.org/stream/salsa20pf.html] <!-- prof1 --> |
| [[Salsa20]]/12<!-- *** Salsa20/12 is the final, accepted version, please see http://www.ecrypt.eu.org/stream/index.html and http://www.ecrypt.eu.org/stream/portfolio.pdf (read section 2 and the part of section 3 titled "Salsa20/12" *** --> [http://www.ecrypt.eu.org/stream/salsa20pf.html] {{Webarchive|url=https://web.archive.org/web/20160405085821/http://www.ecrypt.eu.org/stream/salsa20pf.html |date=2016-04-05 }} <!-- prof1 --> |
||
| [[Trivium (cipher)|Trivium]] [http://www.ecrypt.eu.org/stream/triviumpf.html] <!-- prof2 --> |
| [[Trivium (cipher)|Trivium]] [http://www.ecrypt.eu.org/stream/triviumpf.html] {{Webarchive|url=https://web.archive.org/web/20150923233518/http://www.ecrypt.eu.org/stream/triviumpf.html |date=2015-09-23 }} <!-- prof2 --> |
||
|- |
|- |
||
| [[SOSEMANUK]] [http://www.ecrypt.eu.org/stream/sosemanukpf.html] <!-- prof1 --> |
| [[SOSEMANUK]] [http://www.ecrypt.eu.org/stream/sosemanukpf.html] {{Webarchive|url=https://web.archive.org/web/20120414020956/http://www.ecrypt.eu.org/stream/sosemanukpf.html |date=2012-04-14 }} <!-- prof1 --> |
||
| <!-- Only three prof2 cyphers in this revision --> <!-- prof2 --> |
| <!-- Only three prof2 cyphers in this revision --> <!-- prof2 --> |
||
|} |
|} |
||
Line 57: | Line 57: | ||
Phase 3 started in April 2007. Candidates for Profile 1 (software) were: |
Phase 3 started in April 2007. Candidates for Profile 1 (software) were: |
||
{{div col|colwidth=20em}} |
|||
* [[CryptMT]] (version 3) |
* [[CryptMT]] (version 3) |
||
* [[Dragon (cipher)|Dragon]] |
* [[Dragon (cipher)|Dragon]] |
||
Line 65: | Line 66: | ||
* [[Salsa20]]/12 |
* [[Salsa20]]/12 |
||
* [[SOSEMANUK]] |
* [[SOSEMANUK]] |
||
{{div col end}} |
|||
Candidates for Profile 2 (hardware) were: |
Candidates for Profile 2 (hardware) were: |
||
{{div col|colwidth=20em}} |
|||
* [[DECIM]] (DECIM v2 and DECIM-128) |
* [[DECIM]] (DECIM v2 and DECIM-128) |
||
* [[F-FCSR]] (F-FCSR-H v2 and F-FCSR-16) |
* [[F-FCSR]] (F-FCSR-H v2 and F-FCSR-16) |
||
Line 74: | Line 77: | ||
* [[Moustique]], [[Pomaranch]] (version 3) |
* [[Moustique]], [[Pomaranch]] (version 3) |
||
* [[Trivium (cipher)|Trivium]] |
* [[Trivium (cipher)|Trivium]] |
||
{{div col end}} |
|||
Phase 3 ended on 15 April 2008, with the announcement of the candidates that had been selected for the final eSTREAM portfolio. The selected |
Phase 3 ended on 15 April 2008, with the announcement of the candidates that had been selected for the final eSTREAM portfolio. The selected algorithms were: |
||
* For Profile 1: HC-128, Rabbit, Salsa20/12, and SOSEMANUK. |
|||
* For Profile 2: F-FCSR-H v2, Grain v1, Mickey v2, and Trivium. |
|||
==Submissions== |
==Submissions== |
||
Line 159: | Line 165: | ||
|- |
|- |
||
| [[Grain (cipher)|Grain]] |
| [[Grain (cipher)|Grain]] |
||
| [http://www.ecrypt.eu.org/stream/grainp3.html] |
| [http://www.ecrypt.eu.org/stream/grainp3.html] {{Webarchive|url=https://web.archive.org/web/20120701140433/http://www.ecrypt.eu.org/stream/grainp3.html |date=2012-07-01 }} |
||
| |
| |
||
| '''PF''' |
| '''PF''' |
||
Line 166: | Line 172: | ||
|- |
|- |
||
| [[HC-256]] (HC-128, HC-256) |
| [[HC-256]] (HC-128, HC-256) |
||
| [http://www.ecrypt.eu.org/stream/hcp3.html] |
| [http://www.ecrypt.eu.org/stream/hcp3.html] {{Webarchive|url=https://web.archive.org/web/20120701135853/http://www.ecrypt.eu.org/stream/hcp3.html |date=2012-07-01 }} |
||
| '''PF''' |
| '''PF''' |
||
| |
| |
||
Line 173: | Line 179: | ||
|- |
|- |
||
| [[MICKEY]] (MICKEY 2.0, MICKEY-128 2.0) |
| [[MICKEY]] (MICKEY 2.0, MICKEY-128 2.0) |
||
| [http://www.ecrypt.eu.org/stream/mickeyp3.html] |
| [http://www.ecrypt.eu.org/stream/mickeyp3.html] {{Webarchive|url=https://web.archive.org/web/20120701135340/http://www.ecrypt.eu.org/stream/mickeyp3.html |date=2012-07-01 }} |
||
| |
| |
||
| '''PF''' |
| '''PF''' |
||
Line 180: | Line 186: | ||
|- |
|- |
||
| [[Rabbit (cipher)|Rabbit]] |
| [[Rabbit (cipher)|Rabbit]] |
||
| [http://www.ecrypt.eu.org/stream/rabbitp3.html] |
| [http://www.ecrypt.eu.org/stream/rabbitp3.html] {{Webarchive|url=https://web.archive.org/web/20120701140030/http://www.ecrypt.eu.org/stream/rabbitp3.html |date=2012-07-01 }} |
||
| '''P''' |
| '''P''' |
||
| '''2''' |
| '''2''' |
||
| '''<s>pat</s>'''<ref name="rabbitfree">http://www.ecrypt.eu.org/stream/phorum/read.php?1,1244 {{ |
| '''<s>pat</s>'''<ref name="rabbitfree">[http://www.ecrypt.eu.org/stream/phorum/read.php?1,1244 Archived copy] {{Webarchive|url=https://web.archive.org/web/20090630021733/http://www.ecrypt.eu.org/stream/phorum/read.php?1,1244 |date=2009-06-30 }}</ref> |
||
| Martin Boesgaard, Mette Vesterager, Thomas Christensen and Erik Zenner |
| Martin Boesgaard, Mette Vesterager, Thomas Christensen and Erik Zenner |
||
|- |
|- |
||
| [[Salsa20]] |
| [[Salsa20]] |
||
| [http://www.ecrypt.eu.org/stream/salsa20p3.html] |
| [http://www.ecrypt.eu.org/stream/salsa20p3.html] {{Webarchive|url=https://web.archive.org/web/20120701135350/http://www.ecrypt.eu.org/stream/salsa20p3.html |date=2012-07-01 }} |
||
| '''PF''' |
| '''PF''' |
||
| '''2''' |
| '''2''' |
||
Line 194: | Line 200: | ||
|- |
|- |
||
| [[SOSEMANUK]] |
| [[SOSEMANUK]] |
||
| [http://www.ecrypt.eu.org/stream/sosemanukp3.html] |
| [http://www.ecrypt.eu.org/stream/sosemanukp3.html] {{Webarchive|url=https://web.archive.org/web/20120701135600/http://www.ecrypt.eu.org/stream/sosemanukp3.html |date=2012-07-01 }} |
||
| '''P''' |
| '''P''' |
||
| |
| |
||
Line 201: | Line 207: | ||
|- |
|- |
||
| [[Trivium (cipher)|Trivium]] |
| [[Trivium (cipher)|Trivium]] |
||
| [http://www.ecrypt.eu.org/stream/triviump3.html] |
| [http://www.ecrypt.eu.org/stream/triviump3.html] {{Webarchive|url=https://web.archive.org/web/20120626221741/http://www.ecrypt.eu.org/stream/triviump3.html |date=2012-06-26 }} |
||
| |
| |
||
| '''PF''' |
| '''PF''' |
||
Line 221: | Line 227: | ||
|- |
|- |
||
| [[F-FCSR]] (F-FCSR-H v2, F-FCSR-16) |
| [[F-FCSR]] (F-FCSR-H v2, F-FCSR-16) |
||
| [http://www.ecrypt.eu.org/stream/ffcsrp3.html] |
| [http://www.ecrypt.eu.org/stream/ffcsrp3.html] {{Webarchive|url=https://web.archive.org/web/20120701135335/http://www.ecrypt.eu.org/stream/ffcsrp3.html |date=2012-07-01 }} |
||
| |
| |
||
| '''<s>P</s>''' |
| '''<s>P</s>''' |
||
Line 239: | Line 245: | ||
|- |
|- |
||
| [[CryptMT]] (version 3) |
| [[CryptMT]] (version 3) |
||
| [http://www.ecrypt.eu.org/stream/cryptmtp3.html] |
| [http://www.ecrypt.eu.org/stream/cryptmtp3.html] {{Webarchive|url=https://web.archive.org/web/20120618143122/http://www.ecrypt.eu.org/stream/cryptmtp3.html |date=2012-06-18 }} |
||
| '''3''' |
| '''3''' |
||
| |
| |
||
Line 246: | Line 252: | ||
|- |
|- |
||
| [[DECIM]] (DECIM v2, DECIM-128) |
| [[DECIM]] (DECIM v2, DECIM-128) |
||
| [http://www.ecrypt.eu.org/stream/decimp3.html] |
| [http://www.ecrypt.eu.org/stream/decimp3.html] {{Webarchive|url=https://web.archive.org/web/20120701135843/http://www.ecrypt.eu.org/stream/decimp3.html |date=2012-07-01 }} |
||
| |
| |
||
| '''3''' |
| '''3''' |
||
Line 253: | Line 259: | ||
|- |
|- |
||
| [[Dragon (cipher)|Dragon]] |
| [[Dragon (cipher)|Dragon]] |
||
| [http://www.ecrypt.eu.org/stream/dragonp3.html] |
| [http://www.ecrypt.eu.org/stream/dragonp3.html] {{Webarchive|url=https://web.archive.org/web/20120701140428/http://www.ecrypt.eu.org/stream/dragonp3.html |date=2012-07-01 }} |
||
| '''3F''' |
| '''3F''' |
||
| |
| |
||
Line 260: | Line 266: | ||
|- |
|- |
||
| Edon80 |
| Edon80 |
||
| [http://www.ecrypt.eu.org/stream/edon80p3.html] |
| [http://www.ecrypt.eu.org/stream/edon80p3.html] {{Webarchive|url=https://web.archive.org/web/20120904120421/http://www.ecrypt.eu.org/stream/edon80p3.html |date=2012-09-04 }} |
||
| |
| |
||
| '''3''' |
| '''3''' |
||
Line 267: | Line 273: | ||
|- |
|- |
||
| [[LEX (cipher)|LEX]] |
| [[LEX (cipher)|LEX]] |
||
| [http://www.ecrypt.eu.org/stream/lexp3.html] |
| [http://www.ecrypt.eu.org/stream/lexp3.html] {{Webarchive|url=https://web.archive.org/web/20120701135905/http://www.ecrypt.eu.org/stream/lexp3.html |date=2012-07-01 }} |
||
| '''3F''' |
| '''3F''' |
||
| '''2''' |
| '''2''' |
||
Line 274: | Line 280: | ||
|- |
|- |
||
| [[MOSQUITO]] (aka Moustique) |
| [[MOSQUITO]] (aka Moustique) |
||
| [http://www.ecrypt.eu.org/stream/mosquitop3.html] |
| [http://www.ecrypt.eu.org/stream/mosquitop3.html] {{Webarchive|url=https://web.archive.org/web/20120701135550/http://www.ecrypt.eu.org/stream/mosquitop3.html |date=2012-07-01 }} |
||
| |
| |
||
| '''3''' |
| '''3''' |
||
Line 281: | Line 287: | ||
|- |
|- |
||
| [[NLS (cipher)|NLS]] (NLSv2, encryption-only) |
| [[NLS (cipher)|NLS]] (NLSv2, encryption-only) |
||
| [http://www.ecrypt.eu.org/stream/nlsp3.html] |
| [http://www.ecrypt.eu.org/stream/nlsp3.html] {{Webarchive|url=https://web.archive.org/web/20120701135345/http://www.ecrypt.eu.org/stream/nlsp3.html |date=2012-07-01 }} |
||
| '''3''' |
| '''3''' |
||
| |
| |
||
Line 288: | Line 294: | ||
|- |
|- |
||
| [[CJCSG|Pomaranch]] (version 3) |
| [[CJCSG|Pomaranch]] (version 3) |
||
| [http://www.ecrypt.eu.org/stream/pomaranchp3.html] |
| [http://www.ecrypt.eu.org/stream/pomaranchp3.html] {{Webarchive|url=https://web.archive.org/web/20120701135555/http://www.ecrypt.eu.org/stream/pomaranchp3.html |date=2012-07-01 }} |
||
| |
| |
||
| '''3''' |
| '''3''' |
||
Line 306: | Line 312: | ||
|- |
|- |
||
| [[Phelix]] |
| [[Phelix]] |
||
| [http://www.ecrypt.eu.org/stream/phelixp2.html] |
| [http://www.ecrypt.eu.org/stream/phelixp2.html] {{Webarchive|url=https://web.archive.org/web/20120701140501/http://www.ecrypt.eu.org/stream/phelixp2.html |date=2012-07-01 }} |
||
| '''F''' |
| '''F''' |
||
| '''F''' |
| '''F''' |
||
Line 313: | Line 319: | ||
|- |
|- |
||
| [[Py (cipher)|Py]] |
| [[Py (cipher)|Py]] |
||
| [http://www.ecrypt.eu.org/stream/pyp2.html] |
| [http://www.ecrypt.eu.org/stream/pyp2.html] {{Webarchive|url=https://web.archive.org/web/20120701140025/http://www.ecrypt.eu.org/stream/pyp2.html |date=2012-07-01 }} |
||
| '''F''' |
| '''F''' |
||
| |
| |
||
Line 331: | Line 337: | ||
|- |
|- |
||
| [[ABC (cipher)|ABC]] |
| [[ABC (cipher)|ABC]] |
||
| [http://www.ecrypt.eu.org/stream/abcp2.html] |
| [http://www.ecrypt.eu.org/stream/abcp2.html] {{Webarchive|url=https://web.archive.org/web/20120701140423/http://www.ecrypt.eu.org/stream/abcp2.html |date=2012-07-01 }} |
||
| '''2''' |
| '''2''' |
||
| |
| |
||
Line 338: | Line 344: | ||
|- |
|- |
||
| [[Achterbahn (stream cipher)|Achterbahn]] |
| [[Achterbahn (stream cipher)|Achterbahn]] |
||
| [http://www.ecrypt.eu.org/stream/achterbahnp2.html] |
| [http://www.ecrypt.eu.org/stream/achterbahnp2.html] {{Webarchive|url=https://web.archive.org/web/20120701135837/http://www.ecrypt.eu.org/stream/achterbahnp2.html |date=2012-07-01 }} |
||
| |
| |
||
| '''2''' |
| '''2''' |
||
Line 345: | Line 351: | ||
|- |
|- |
||
| [[DICING]] |
| [[DICING]] |
||
| [http://www.ecrypt.eu.org/stream/dicingp2.html] |
| [http://www.ecrypt.eu.org/stream/dicingp2.html] {{Webarchive|url=https://web.archive.org/web/20120701135533/http://www.ecrypt.eu.org/stream/dicingp2.html |date=2012-07-01 }} |
||
| '''2''' |
| '''2''' |
||
| |
| |
||
Line 352: | Line 358: | ||
|- |
|- |
||
| [[Hermes8]] |
| [[Hermes8]] |
||
| [http://www.ecrypt.eu.org/stream/hermes8p2.html] |
| [http://www.ecrypt.eu.org/stream/hermes8p2.html] {{Webarchive|url=https://web.archive.org/web/20120701135858/http://www.ecrypt.eu.org/stream/hermes8p2.html |date=2012-07-01 }} |
||
| '''A''' |
| '''A''' |
||
| '''2''' |
| '''2''' |
||
Line 359: | Line 365: | ||
|- |
|- |
||
| [[NLS (cipher)|NLS]] |
| [[NLS (cipher)|NLS]] |
||
| [http://www.ecrypt.eu.org/stream/nlsp2.html] |
| [http://www.ecrypt.eu.org/stream/nlsp2.html] {{Webarchive|url=https://web.archive.org/web/20120701135910/http://www.ecrypt.eu.org/stream/nlsp2.html |date=2012-07-01 }} |
||
| '''2''' |
| '''2''' |
||
| '''2''' |
| '''2''' |
||
Line 366: | Line 372: | ||
|- |
|- |
||
| [[Polar Bear (cipher)|Polar Bear]] |
| [[Polar Bear (cipher)|Polar Bear]] |
||
| [http://www.ecrypt.eu.org/stream/polarbearp2.html] |
| [http://www.ecrypt.eu.org/stream/polarbearp2.html] {{Webarchive|url=https://web.archive.org/web/20120701135915/http://www.ecrypt.eu.org/stream/polarbearp2.html |date=2012-07-01 }} |
||
| '''2''' |
| '''2''' |
||
| '''2''' |
| '''2''' |
||
Line 373: | Line 379: | ||
|- |
|- |
||
| [[CJCSG|Pomaranch]] |
| [[CJCSG|Pomaranch]] |
||
| [http://www.ecrypt.eu.org/stream/pomaranchp2.html] |
| [http://www.ecrypt.eu.org/stream/pomaranchp2.html] {{Webarchive|url=https://web.archive.org/web/20120701140506/http://www.ecrypt.eu.org/stream/pomaranchp2.html |date=2012-07-01 }} |
||
| '''A''' |
| '''A''' |
||
| '''2''' |
| '''2''' |
||
Line 387: | Line 393: | ||
|- |
|- |
||
| [[TSC-3]] |
| [[TSC-3]] |
||
| [http://www.ecrypt.eu.org/stream/tsc3p2.html] |
| [http://www.ecrypt.eu.org/stream/tsc3p2.html] {{Webarchive|url=https://web.archive.org/web/20120701135454/http://www.ecrypt.eu.org/stream/tsc3p2.html |date=2012-07-01 }} |
||
| |
| |
||
| '''2''' |
| '''2''' |
||
Line 394: | Line 400: | ||
|- |
|- |
||
| [[VEST]] |
| [[VEST]] |
||
| [http://www.ecrypt.eu.org/stream/vestp2.html] |
| [http://www.ecrypt.eu.org/stream/vestp2.html] {{Webarchive|url=https://web.archive.org/web/20160304113803/http://www.ecrypt.eu.org/stream/vestp2.html |date=2016-03-04 }} |
||
| |
| |
||
| '''2''' |
| '''2''' |
||
Line 401: | Line 407: | ||
|- |
|- |
||
| [[WG (cipher)|WG]] |
| [[WG (cipher)|WG]] |
||
| [http://www.ecrypt.eu.org/stream/wgp2.html] |
| [http://www.ecrypt.eu.org/stream/wgp2.html]{{Dead link|date=June 2023 |bot=InternetArchiveBot |fix-attempted=yes }} |
||
| |
| |
||
| '''2''' |
| '''2''' |
||
| |
| |
||
| Guang Gong and Yassir Nawaz |
| [[Guang Gong]] and Yassir Nawaz |
||
|- |
|- |
||
| |
| Yamb |
||
| [http://www.ecrypt.eu.org/stream/yambp2.html]{{dead link|date=September 2017 |bot=InternetArchiveBot |fix-attempted=yes }} |
| [http://www.ecrypt.eu.org/stream/yambp2.html]{{dead link|date=September 2017 |bot=InternetArchiveBot |fix-attempted=yes }} |
||
| '''2''' |
| '''2''' |
||
Line 433: | Line 439: | ||
|- |
|- |
||
| [[Frogbit (cipher)|Frogbit]] |
| [[Frogbit (cipher)|Frogbit]] |
||
| [http://www.ecrypt.eu.org/stream/frogbit.html] |
| [http://www.ecrypt.eu.org/stream/frogbit.html] {{Webarchive|url=https://web.archive.org/web/20120701135543/http://www.ecrypt.eu.org/stream/frogbit.html |date=2012-07-01 }} |
||
| '''A''' |
| '''A''' |
||
| |
| |
||
Line 440: | Line 446: | ||
|- |
|- |
||
| [[Fubuki (cipher)|Fubuki]] |
| [[Fubuki (cipher)|Fubuki]] |
||
| [http://www.ecrypt.eu.org/stream/cryptmtfubuki.html] |
| [http://www.ecrypt.eu.org/stream/cryptmtfubuki.html] {{Webarchive|url=https://web.archive.org/web/20120701135329/http://www.ecrypt.eu.org/stream/cryptmtfubuki.html |date=2012-07-01 }} |
||
| '''A''' |
| '''A''' |
||
| |
| |
||
Line 447: | Line 453: | ||
|- |
|- |
||
| [[MAG (cryptography)|MAG]] |
| [[MAG (cryptography)|MAG]] |
||
| [http://www.ecrypt.eu.org/stream/mag.html] |
| [http://www.ecrypt.eu.org/stream/mag.html] {{Webarchive|url=https://web.archive.org/web/20120701140445/http://www.ecrypt.eu.org/stream/mag.html |date=2012-07-01 }} |
||
| '''A''' |
| '''A''' |
||
| '''A''' |
| '''A''' |
||
Line 454: | Line 460: | ||
|- |
|- |
||
| [[Mir-1]] |
| [[Mir-1]] |
||
| [http://www.ecrypt.eu.org/stream/mir1.html] |
| [http://www.ecrypt.eu.org/stream/mir1.html] {{Webarchive|url=https://web.archive.org/web/20120701140456/http://www.ecrypt.eu.org/stream/mir1.html |date=2012-07-01 }} |
||
| '''A''' |
| '''A''' |
||
| |
| |
||
Line 461: | Line 467: | ||
|- |
|- |
||
| [[SSS (cipher)|SSS]] |
| [[SSS (cipher)|SSS]] |
||
| [http://www.ecrypt.eu.org/stream/sss.html] |
| [http://www.ecrypt.eu.org/stream/sss.html] {{Webarchive|url=https://web.archive.org/web/20120701135419/http://www.ecrypt.eu.org/stream/sss.html |date=2012-07-01 }} |
||
| '''A''' |
| '''A''' |
||
| '''A''' |
| '''A''' |
||
Line 468: | Line 474: | ||
|- |
|- |
||
| [[TRBDK3 YAEA]] |
| [[TRBDK3 YAEA]] |
||
| [http://www.ecrypt.eu.org/stream/trbdk3.html] |
| [http://www.ecrypt.eu.org/stream/trbdk3.html] {{Webarchive|url=https://web.archive.org/web/20120701135610/http://www.ecrypt.eu.org/stream/trbdk3.html |date=2012-07-01 }} |
||
| '''A''' |
| '''A''' |
||
| '''A''' |
| '''A''' |
||
Line 486: | Line 492: | ||
==External links== |
==External links== |
||
* [http://www.ecrypt.eu.org/stream/ Homepage for the project] |
* [http://www.ecrypt.eu.org/stream/ Homepage for the project] {{Webarchive|url=https://web.archive.org/web/20120415032728/http://www.ecrypt.eu.org/stream/ |date=2012-04-15 }} |
||
** [http://www.ecrypt.eu.org/stream/phorum/list.php?1 Discussion forum] |
** [http://www.ecrypt.eu.org/stream/phorum/list.php?1 Discussion forum] {{Webarchive|url=https://web.archive.org/web/20120422152217/http://www.ecrypt.eu.org/stream/phorum/list.php?1 |date=2012-04-22 }} |
||
** The eSTREAM testing framework [http://www.ecrypt.eu.org/stream/perf/ eSTREAM Optimized Code HOWTO] |
** The eSTREAM testing framework [http://www.ecrypt.eu.org/stream/perf/ eSTREAM Optimized Code HOWTO] {{Webarchive|url=https://web.archive.org/web/20120615144620/http://www.ecrypt.eu.org/stream/perf/ |date=2012-06-15 }} |
||
** Update 1: [http://www.ecrypt.eu.org/stream/papersdir/057.pdf (PDF)] |
** Update 1: [http://www.ecrypt.eu.org/stream/papersdir/057.pdf (PDF)] {{Webarchive|url=https://web.archive.org/web/20120717061527/http://www.ecrypt.eu.org/stream/papersdir/057.pdf |date=2012-07-17 }} |
||
* [http://cr.yp.to/streamciphers.html Notes on the ECRYPT Stream Cipher project] by [[Daniel J. Bernstein]] |
* [http://cr.yp.to/streamciphers.html Notes on the ECRYPT Stream Cipher project] by [[Daniel J. Bernstein]] |
||
Line 495: | Line 501: | ||
[[Category:Cryptography contests]] |
[[Category:Cryptography contests]] |
||
[[Category:Information technology organizations based in Europe]] |
|||
[[Category:Internet and the European Union]] |
|||
[[Category:Research projects]] |
[[Category:Research projects]] |
||
[[Category:Stream ciphers]] |
[[Category:Stream ciphers]] |
Latest revision as of 20:11, 1 November 2024
This article has multiple issues. Please help improve it or discuss these issues on the talk page. (Learn how and when to remove these messages)
|
eSTREAM is a project to "identify new stream ciphers suitable for widespread adoption",[1][2] organised by the EU ECRYPT network. It was set up as a result of the failure of all six stream ciphers submitted to the NESSIE project. The call for primitives was first issued in November 2004. The project was completed in April 2008. The project was divided into separate phases and the project goal was to find algorithms suitable for different application profiles.
Profiles
[edit]The submissions to eSTREAM fall into either or both of two profiles:
- Profile 1: "Stream ciphers for software applications with high throughput requirements"
- Profile 2: "Stream ciphers for hardware applications with restricted resources such as limited storage, gate count, or power consumption."
Both profiles contain an "A" subcategory (1A and 2A) with ciphers that also provide authentication in addition to encryption. In Phase 3 none of the ciphers providing authentication are being considered (The NLS cipher had authentication removed from it to improve its performance).
eSTREAM portfolio
[edit]As of September 2011[update] the following ciphers make up the eSTREAM portfolio:[3]
Profile 1 (software) | Profile 2 (hardware) |
---|---|
HC-128 [1] Archived 2012-07-01 at the Wayback Machine | Grain [2] Archived 2008-10-06 at the Wayback Machine |
Rabbit [3] Archived 2012-06-13 at the Wayback Machine | MICKEY [4] Archived 2012-07-01 at the Wayback Machine |
Salsa20/12 [5] Archived 2016-04-05 at the Wayback Machine | Trivium [6] Archived 2015-09-23 at the Wayback Machine |
SOSEMANUK [7] Archived 2012-04-14 at the Wayback Machine |
These are all free for any use. Rabbit was the only one that had a patent pending during the eStream competition, but it was released into the public domain in October 2008.[4]
The original portfolio, published at the end of Phase 3, consisted of the above ciphers plus F-FCSR which was in Profile 2.[5] However, cryptanalysis of F-FCSR [6] led to a revision of the portfolio in September 2008 which removed that cipher.
Phases
[edit]Phase 1
[edit]Phase 1 included a general analysis of all submissions with the purpose of selecting a subset of the submitted designs for further scrutiny. The designs were scrutinized based on criteria of security, performance (with respect to the block cipher AES—a US Government approved standard, as well as the other candidates), simplicity and flexibility, justification and supporting analysis, and clarity and completeness of the documentation. Submissions in Profile 1 were only accepted if they demonstrated software performance superior to AES-128 in counter mode.
Activities in Phase 1 included a large amount of analysis and presentations of analysis results as well as discussion. The project also developed a framework for testing the performance of the candidates. The framework was then used to benchmark the candidates on a wide variety of systems.
On 27 March 2006, the eSTREAM project officially announced the end of Phase 1.
Phase 2
[edit]On 1 August 2006, Phase 2 was officially started. For each of the profiles, a number of algorithms has been selected to be Focus Phase 2 algorithms. These are designs that eSTREAM finds of particular interest and encourages more cryptanalysis and performance evaluation on these algorithms. Additionally a number of algorithms for each profile are accepted as Phase 2 algorithms, meaning that they are still valid as eSTREAM candidates. The Focus 2 candidates will be re-classified every six months.
Phase 3
[edit]Phase 3 started in April 2007. Candidates for Profile 1 (software) were:
Candidates for Profile 2 (hardware) were:
Phase 3 ended on 15 April 2008, with the announcement of the candidates that had been selected for the final eSTREAM portfolio. The selected algorithms were:
- For Profile 1: HC-128, Rabbit, Salsa20/12, and SOSEMANUK.
- For Profile 2: F-FCSR-H v2, Grain v1, Mickey v2, and Trivium.
Submissions
[edit]Key | |
---|---|
P | In the eSTREAM profile |
Formerly in the eSTREAM profile | |
3 | A "Phase 3" cipher |
F | a "Focus Phase 2" cipher |
2 | A "Phase 2" cipher |
A | An "archived" cipher |
M | Includes a MAC |
pat | Patented or patent pending; some uses require a license |
Was pat, now free for any use |
In eSTREAM portfolio
[edit]The eSTREAM portfolio ciphers are, as of January 2012[update]:[7]
Profile 1 (software) |
Profile 2 (hardware) |
---|---|
128-bit key | 80-bit key |
HC-128 | Grain v1 |
Rabbit | MICKEY 2.0 |
Salsa20/12 | Trivium |
SOSEMANUK | - |
Versions of the eSTREAM portfolio ciphers that support extended key lengths:
Profile 1 (software) |
Profile 2 (hardware) |
---|---|
256-bit key | 128-bit key |
HC-256 | - |
- | MICKEY-128 2.0 |
Salsa20/12 | - |
- | - |
Note that the 128-bit version of Grain v1 is no longer supported by its designers and has been replaced by Grain-128a. Grain-128a is not considered to be part of the eSTREAM portfolio.
As of December 2008[update]:
Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Submitters |
---|---|---|---|---|---|
Grain | [8] Archived 2012-07-01 at the Wayback Machine | PF | Martin Hell, Thomas Johansson and Willi Meier | ||
HC-256 (HC-128, HC-256) | [9] Archived 2012-07-01 at the Wayback Machine | PF | Hongjun Wu | ||
MICKEY (MICKEY 2.0, MICKEY-128 2.0) | [10] Archived 2012-07-01 at the Wayback Machine | PF | Steve Babbage and Matthew Dodd | ||
Rabbit | [11] Archived 2012-07-01 at the Wayback Machine | P | 2 | Martin Boesgaard, Mette Vesterager, Thomas Christensen and Erik Zenner | |
Salsa20 | [12] Archived 2012-07-01 at the Wayback Machine | PF | 2 | Daniel J. Bernstein | |
SOSEMANUK | [13] Archived 2012-07-01 at the Wayback Machine | P | Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert | ||
Trivium | [14] Archived 2012-06-26 at the Wayback Machine | PF | Christophe De Cannière and Bart Preneel |
No longer in eSTREAM portfolio
[edit]This cipher was in the original portfolio but was removed in revision 1, published in September 2008.
Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Submitters |
---|---|---|---|---|---|
F-FCSR (F-FCSR-H v2, F-FCSR-16) | [15] Archived 2012-07-01 at the Wayback Machine | Thierry Berger, François Arnault and Cédric Lauradoux |
Selected as Phase 3 candidates but not for the portfolio
[edit]Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Submitters |
---|---|---|---|---|---|
CryptMT (version 3) | [16] Archived 2012-06-18 at the Wayback Machine | 3 | pat | Makoto Matsumoto, Hagita Mariko, Takuji Nishimura and Matsuo Saito | |
DECIM (DECIM v2, DECIM-128) | [17] Archived 2012-07-01 at the Wayback Machine | 3 | pat | Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert | |
Dragon | [18] Archived 2012-07-01 at the Wayback Machine | 3F | Ed Dawson, Kevin Chen, Matt Henricksen, William Millan, Leonie Simpson, HoonJae Lee, SangJae Moon | ||
Edon80 | [19] Archived 2012-09-04 at the Wayback Machine | 3 | Danilo Gligoroski, Smile Markovski, Ljupco Kocarev and Marjan Gusev | ||
LEX | [20] Archived 2012-07-01 at the Wayback Machine | 3F | 2 | Alex Biryukov | |
MOSQUITO (aka Moustique) | [21] Archived 2012-07-01 at the Wayback Machine | 3 | Joan Daemen and Paris Kitsos | ||
NLS (NLSv2, encryption-only) | [22] Archived 2012-07-01 at the Wayback Machine | 3 | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries | ||
Pomaranch (version 3) | [23] Archived 2012-07-01 at the Wayback Machine | 3 | Tor Helleseth, Cees Jansen and Alexander Kolosha |
Selected as Phase 2 focus candidates but not as Phase 3 candidates
[edit]Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Submitters |
---|---|---|---|---|---|
Phelix | [24] Archived 2012-07-01 at the Wayback Machine | F | F | M | Doug Whiting, Bruce Schneier, Stefan Lucks and Frédéric Muller |
Py | [25] Archived 2012-07-01 at the Wayback Machine | F | Eli Biham and Jennifer Seberry |
Selected as Phase 2 candidates but not as focus or Phase 3 candidates
[edit]Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Submitters |
---|---|---|---|---|---|
ABC | [26] Archived 2012-07-01 at the Wayback Machine | 2 | Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov and Sandeep Kumar | ||
Achterbahn | [27] Archived 2012-07-01 at the Wayback Machine | 2 | Berndt Gammel, Rainer Göttfert and Oliver Kniffler | ||
DICING | [28] Archived 2012-07-01 at the Wayback Machine | 2 | Li An-Ping | ||
Hermes8 | [29] Archived 2012-07-01 at the Wayback Machine | A | 2 | Ulrich Kaiser | |
NLS | [30] Archived 2012-07-01 at the Wayback Machine | 2 | 2 | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries | |
Polar Bear | [31] Archived 2012-07-01 at the Wayback Machine | 2 | 2 | Johan Håstad and Mats Näslund | |
Pomaranch | [32] Archived 2012-07-01 at the Wayback Machine | A | 2 | Cees Jansen and Alexander Kolosha | |
SFINKS | [33][permanent dead link ] | 2 | M | An Braeken, Joseph Lano, Nele Mentens, Bart Preneel and Ingrid Verbauwhede | |
TSC-3 | [34] Archived 2012-07-01 at the Wayback Machine | 2 | Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han and Seongtaek Chee | ||
VEST | [35] Archived 2016-03-04 at the Wayback Machine | 2 | M pat | Sean O'Neil, Benjamin Gittins and Howard Landman | |
WG | [36][permanent dead link ] | 2 | Guang Gong and Yassir Nawaz | ||
Yamb | [37][permanent dead link ] | 2 | 2 | LAN Crypto | |
ZK-Crypt | [38][permanent dead link ] | 2 | M pat | Carmi Gressel, Ran Granot and Gabi Vago |
Not selected as focus or Phase 2 candidates
[edit]Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Submitters |
---|---|---|---|---|---|
Frogbit | [39] Archived 2012-07-01 at the Wayback Machine | A | M pat | Thierry Moreau | |
Fubuki | [40] Archived 2012-07-01 at the Wayback Machine | A | pat | Makoto Matsumoto, Hagita Mariko, Takuji Nishimura and Matsuo Saito | |
MAG | [41] Archived 2012-07-01 at the Wayback Machine | A | A | Rade Vuckovac | |
Mir-1 | [42] Archived 2012-07-01 at the Wayback Machine | A | Alexander Maximov | ||
SSS | [43] Archived 2012-07-01 at the Wayback Machine | A | A | M | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries |
TRBDK3 YAEA | [44] Archived 2012-07-01 at the Wayback Machine | A | A | Timothy Brigham |
See also
[edit]- AES process
- CAESAR Competition – Competition to design authenticated encryption schemes
- NESSIE
- CRYPTREC
References
[edit]- ^ "ECRYPT Call for Stream Cipher Primitives" (version 1.3 ed.). 12 April 2005. Archived from the original on 17 July 2012. Retrieved 2 April 2014.
- ^ Vincent Rijmen (2010-01-01). "Stream Ciphers and the eSTREAM Project" (PDF).
- ^ "The eSTREAM Portfolio (rev. 1)" (PDF). Archived from the original (PDF) on 2012-08-13. Retrieved 2008-10-01.
- ^ a b Archived copy Archived 2009-06-30 at the Wayback Machine
- ^ "The eSTREAM Project - eSTREAM Phase 3". www.ecrypt.eu.org.
- ^ M. Hell and T. Johansson. Breaking the F-FCSR-H stream cipher in Real Time. In J. Pieprzyk, editor, Proceedings of Asiacrypt 2008, Lecture Notes in Computer Science, to appear.
- ^ "ECRYPT II" (PDF). Archived from the original (PDF) on 18 October 2012. Retrieved 23 March 2013.
External links
[edit]- Homepage for the project Archived 2012-04-15 at the Wayback Machine
- Discussion forum Archived 2012-04-22 at the Wayback Machine
- The eSTREAM testing framework eSTREAM Optimized Code HOWTO Archived 2012-06-15 at the Wayback Machine
- Update 1: (PDF) Archived 2012-07-17 at the Wayback Machine
- Notes on the ECRYPT Stream Cipher project by Daniel J. Bernstein