Scream: A Software-Efficient Stream Cipher

Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2365)


We report on the design of Scream, a new software-efficient stream cipher, which was designed to be a “more secure SEAL”. Following SEAL, the design of Scream resembles in many ways a block-cipher design. The new cipher is roughly as fast as SEAL, but we believe that it offers a significantly higher security level. In the process of designing this cipher, we re-visit the SEAL design paradigm, exhibiting some tradeoffs and limitations.


Stream ciphers Block ciphers Round functions SEAL 


  1. 1.
    D. Coppersmith, S. Halevi, and C. Jutla. Cryptanalysis of stream ciphers with linear masking. manuscript, 2002.Google Scholar
  2. 2.
    J. Daemen and V. Rijmen. AES proposal: Rijndael. Available on-line from NIST at, 1998.
  3. 3.
    S. Fluhrer. Cryptanalysis of the SEAL 3.0 pseudorandom function family. In Proceedings of the Fast Software Encryption Workshop (FSE’01), 2001.Google Scholar
  4. 4.
    H. Handschuh and H. Gilbert. χ2 cryptanalysis of the SEAL encryption algorithm. In Proceedings of the 4th Workshop on Fast Software Encryption, volume 1267 of Lecture Notes in Computer Science, pages 1–12. Springer-Verlag, 1997.CrossRefGoogle Scholar
  5. 5.
    P. Rogaway and D. Coppersmith. A software optimized encryption algorithm. Journal of Cryptology, 11(4):273–287, 1998.zbMATHCrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2002

Authors and Affiliations

  1. 1.IBM T.J. Watson Research CenterYorktown HeightsUSA

Personalised recommendations