Abstract
The eStream project (2004–2008) was a research project of European cryptographers to identify a portfolio of interesting new stream ciphers. Representative for all ciphers from these project we describe three in detail. Two unbroken finalists: one optimised for hardware an one optimised for software implementation. The third example is an interesting, but unfortunately unsuccessful attempt to revive asynchronous stream ciphers. All three examples show state of the art stream cipher design.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aumasson, J.P.: On a bias of Rabbit. http://www.ecrypt.eu.org/stream/papersdir/2006/058.pdf
Bernstein, D.J.: Why haven’t cube attacks broken anything. http://cr.yp.to/cubeattacks.html
Bernstein, D.J.: Related-key attacks: who cares? eStream discussion forum. http://www.ecrypt.eu.org/stream/phorum, 22 June 2005
Boesgaard, M., Vesterager, M., Peterson, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) Proceedings of Fast Software Encryption 2003. LNCS, vol. 2887, pp. 307–329. Springer, Berlin (2003)
Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Doctoral dissertation. K.U. Leuven, March 1995
Daemen, J., Govaert, R., Vandewalle, J.: On the design of high speed self-synchonizing stream ciphers. In: Kam, P.Y., Hirota, O. (eds.) Singapore ICCS/ISITA ’92 Conference Proceedings, pp. 183–279. IEEE, New York (1992)
Daemen, J., Kitsos, P.: The self-synchonizing stream cipher MOSQUITO: eSTREAM documentation, version 2 (2005). http://www.ecrypt.eu.org/stream/p3ciphers/mosquito/mosquito.pdf
Daemen, J., Kitsos, P.: The self-synchonizing stream cipher MOUSTIQUE (2006). http://www.ecrypt.eu.org/stream/p3ciphers/mosquito/mosquito_p3.pdf
Daemen, J., Lano, J., Preneel, B.: Chosen ciphertext attack on SSS (2005). http://www.ecrypt.eu.org/stream/papersdir/044.pdf
De Cannière, C., Preneel, B.: Trivium. http://www.ecrypt.eu.org/stream/triviump3.html
Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT. LNCS, vol. 5479, pp. 278–299. Springer, Berlin (2009). Also available as Cryptology ePrint Archive, Report 2008/385 http://eprint.iacr.org/
The estream project. http://www.ecrypt.eu.org/stream/
Hawkes, P., Paddon, M., Rose, G.G., de Vries, M.W.: Primitive specification for SSS (2005). http://www.ecrypt.eu.org/stream/ciphers/sss/sss.pdf
Joux, A., Muller, F.: Chosen-ciphertext attacks against MOSQUITO. In: Robshaw, M. (ed.) Fast Software Encryption 2006. LNCS, vol. 4047, pp. 390–404. Springer, Berlin (2006)
Käsper, E., Rijmen, V., Bjørstad, T.E., Rechberger, C., Robshaw, M.J.B., Sekar, G.: Correlated keystreams in Moustique. In: AFRICACRYPT, pp. 246–257 (2008)
Kohno, T., Viega, J., Whiting, D.: Cwc: A high-performance conventional authenticated encryption mode. Cryptology ePrint Archive, Report 2003/106 (2003). http://eprint.iacr.org/
The OCB authenticated-encryption algorithm. http://datatracker.ietf.org/doc/draft-krovetz-ocb/?include_text=1
Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs, the ESTREAM Finalists. Lecture Notes in Computer Science, Security and Cryptology, vol. 4986. Springer, Berlin (2008)
Shamir, A., Tsaban, B.: Guaranteeing the diversity of number generators. Inf. Comput. 171(2), 350–363 (2001)
Author information
Authors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag London
About this chapter
Cite this chapter
Klein, A. (2013). The eStream Project. In: Stream Ciphers. Springer, London. https://doi.org/10.1007/978-1-4471-5079-4_10
Download citation
DOI: https://doi.org/10.1007/978-1-4471-5079-4_10
Publisher Name: Springer, London
Print ISBN: 978-1-4471-5078-7
Online ISBN: 978-1-4471-5079-4
eBook Packages: Mathematics and StatisticsMathematics and Statistics (R0)