Cryptographic competitions


Introduction
Secret-key cryptography
Disasters
Features
Focused competitions:
AES
eSTREAM
SHA-3
PHC
CAESAR
Broader evaluations:
CRYPTREC
NESSIE
CAESAR details:
Submissions
Call for submissions
Call draft 5
Call draft 4
Call draft 3
Call draft 2
Call draft 1
Committee
Frequently asked questions

eSTREAM: the ECRYPT Stream Cipher Project

Requirements

Submissions to eSTREAM were required to fit into at least one of the following two profiles:

  • Profile 1: Stream ciphers for software applications with high throughput. Must support 128-bit key. Must support 64-bit IV and 128-bit IV.
  • Profile 2: Stream ciphers for hardware applications with highly restricted resources. Must support 80-bit key. Must support 32-bit IV and 64-bit IV.

Submissions were allowed to be authenticated ciphers, producing ciphertexts together with authentication tags of length 32 bits (for either profile), 64 bits (for either profile), 96 bits (for profile 2), or 128 bits (for profile 2).

Timeline

  • M-6, 2004.10.14–15: SASC: The State of the Art of Stream Ciphers.
  • M0, 2005.04.29: Deadline for cipher submissions. 34 ciphers were submitted.
  • M1, 2005.05.26–27: SKEW: Symmetric Key Encryption Workshop. Aarhus.
  • M10, 2006.02.02–03: SASC 2006: Stream Ciphers Revisited. Leuven.
  • M11, 2006.03.27: eSTREAM committee announces list of 27 second-round ciphers.
  • M14, 2006.06.30: Deadline for second-round tweaks.
  • M21, 2007.01.31–02.01: SASC 2007: The State of the Art of Stream Ciphers. Bochum.
  • M24, 2007.04.06: eSTREAM committee announces list of 16 finalists.
  • M34, 2008.02.13–14: SASC 2008: The State of the Art of Stream Ciphers. Lausanne.
  • M36, 2008.04: eSTREAM committee announces portfolio of 8 ciphers.
  • M41, 2008.09: eSTREAM committee announces revised portfolio of 7 ciphers.

Candidates

In this table, S means profile 1 (high-throughput software); H means profile 2 (highly restricted hardware); A means authenticated. F-FCSR-H was originally in the portfolio but was removed from the revised portfolio.

portfolio

finalist

round 2

round 1

S

S

S

S

HC-128 (also HC-256)

S

S

S

S+H

Rabbit

S

S

S+H

S+H

Salsa20/12 (also Salsa20/8, Salsa20)

S

S

S

S

SOSEMANUK

H

H

H

H

Grain v1 (supersedes: Grain v0)

H

H

H

H

MICKEY 2.0 (also MICKEY-128 v2)

H

H

H

H

Trivium

H

H

S+H

F-FCSR-H (also F-FCSR-16; supersedes: F-FCSR)

S

S

S

CryptMT v3 (supersedes: CryptMT v1, Fubuki)

S

S

S

Dragon

S

S+H

S+H

LEX

S

S+H+A

S+H+A

NLS v2 (supersedes: NLS v1)

H

H

H

DECIM v2 (supersedes: DECIM v1)

H

H

H

Edon-80

H

H

H

MOUSTIQUE (supersedes: MOSQUITO)

H

H

H

POMARANCH v3 (supersedes: POMARANCH v1)

S

S

ABC v3 (supersedes: ABC v1)

S

S

DICING P2 (supersedes: DICING P1)

S+H+A

S+H+A

Phelix

S+H

S+H

Polar Bear v2 (supersedes: Polar Bear v1)

S

S

Py

H

H

Achterbahn-80 (also Achterbahn-128)

H

S+H

Hermes8

H

H

TSC-4 (supersedes: TSC-3)

H+A

H+A

VEST P2 (supersedes: VEST P1)

H

H

WG P2 (supersedes: WG P1)

H+A

H

ZK-Crypt P2 (supersedes: ZK-Crypt P1)

S+A

Frogbit

S

Mir-1

S+H

MAG

S+H+A

SSS

S+H

TRBDK3 YAEA

S+H

Yamb

H+A

SFINKS


Version: This is version 2014.01.27 of the estream.html web page.