Skip to main content

The eStream Project

  • Chapter
Stream Ciphers

Abstract

The eStream project (2004–2008) was a research project of European cryptographers to identify a portfolio of interesting new stream ciphers. Representative for all ciphers from these project we describe three in detail. Two unbroken finalists: one optimised for hardware an one optimised for software implementation. The third example is an interesting, but unfortunately unsuccessful attempt to revive asynchronous stream ciphers. All three examples show state of the art stream cipher design.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 64.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 84.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Aumasson, J.P.: On a bias of Rabbit. http://www.ecrypt.eu.org/stream/papersdir/2006/058.pdf

  2. Bernstein, D.J.: Why haven’t cube attacks broken anything. http://cr.yp.to/cubeattacks.html

  3. Bernstein, D.J.: Related-key attacks: who cares? eStream discussion forum. http://www.ecrypt.eu.org/stream/phorum, 22 June 2005

  4. Boesgaard, M., Vesterager, M., Peterson, T., Christiansen, J., Scavenius, O.: Rabbit: a new high-performance stream cipher. In: Johansson, T. (ed.) Proceedings of Fast Software Encryption 2003. LNCS, vol. 2887, pp. 307–329. Springer, Berlin (2003)

    Chapter  Google Scholar 

  5. Daemen, J.: Cipher and hash function design strategies based on linear and differential cryptanalysis. Doctoral dissertation. K.U. Leuven, March 1995

    Google Scholar 

  6. Daemen, J., Govaert, R., Vandewalle, J.: On the design of high speed self-synchonizing stream ciphers. In: Kam, P.Y., Hirota, O. (eds.) Singapore ICCS/ISITA ’92 Conference Proceedings, pp. 183–279. IEEE, New York (1992)

    Google Scholar 

  7. Daemen, J., Kitsos, P.: The self-synchonizing stream cipher MOSQUITO: eSTREAM documentation, version 2 (2005). http://www.ecrypt.eu.org/stream/p3ciphers/mosquito/mosquito.pdf

  8. Daemen, J., Kitsos, P.: The self-synchonizing stream cipher MOUSTIQUE (2006). http://www.ecrypt.eu.org/stream/p3ciphers/mosquito/mosquito_p3.pdf

  9. Daemen, J., Lano, J., Preneel, B.: Chosen ciphertext attack on SSS (2005). http://www.ecrypt.eu.org/stream/papersdir/044.pdf

  10. De Cannière, C., Preneel, B.: Trivium. http://www.ecrypt.eu.org/stream/triviump3.html

  11. Dinur, I., Shamir, A.: Cube attacks on tweakable black box polynomials. In: Joux, A. (ed.) EUROCRYPT. LNCS, vol. 5479, pp. 278–299. Springer, Berlin (2009). Also available as Cryptology ePrint Archive, Report 2008/385 http://eprint.iacr.org/

    Google Scholar 

  12. The estream project. http://www.ecrypt.eu.org/stream/

  13. Hawkes, P., Paddon, M., Rose, G.G., de Vries, M.W.: Primitive specification for SSS (2005). http://www.ecrypt.eu.org/stream/ciphers/sss/sss.pdf

  14. Joux, A., Muller, F.: Chosen-ciphertext attacks against MOSQUITO. In: Robshaw, M. (ed.) Fast Software Encryption 2006. LNCS, vol. 4047, pp. 390–404. Springer, Berlin (2006)

    Chapter  Google Scholar 

  15. Käsper, E., Rijmen, V., Bjørstad, T.E., Rechberger, C., Robshaw, M.J.B., Sekar, G.: Correlated keystreams in Moustique. In: AFRICACRYPT, pp. 246–257 (2008)

    Google Scholar 

  16. Kohno, T., Viega, J., Whiting, D.: Cwc: A high-performance conventional authenticated encryption mode. Cryptology ePrint Archive, Report 2003/106 (2003). http://eprint.iacr.org/

  17. The OCB authenticated-encryption algorithm. http://datatracker.ietf.org/doc/draft-krovetz-ocb/?include_text=1

  18. Robshaw, M., Billet, O. (eds.): New Stream Cipher Designs, the ESTREAM Finalists. Lecture Notes in Computer Science, Security and Cryptology, vol. 4986. Springer, Berlin (2008)

    Google Scholar 

  19. Shamir, A., Tsaban, B.: Guaranteeing the diversity of number generators. Inf. Comput. 171(2), 350–363 (2001)

    Article  MathSciNet  MATH  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag London

About this chapter

Cite this chapter

Klein, A. (2013). The eStream Project. In: Stream Ciphers. Springer, London. https://doi.org/10.1007/978-1-4471-5079-4_10

Download citation

Publish with us

Policies and ethics