Announcements
eSTREAM Portfolio 2009 Annual Update (October 2009)
A report with updated cryptanalytic results, as well as new results on hardware and/or software implementation, of portfolio ciphers. The report can be found here.The eSTREAM Portfolio (revision 1) (September 2008)
The eSTREAM portfolio has been revised and the portfolio now contains the following ciphers:Profile 1 (SW) Profile 2 (HW) HC-128 Grain v1 Rabbit MICKEY v2 Salsa20/12 Trivium SOSEMANUK The eSTREAM portfolio was revised on September 8, 2008. Details of this first revision can be found here.
The eSTREAM Portfolio (April 2008)
The eSTREAM portfolio has been finalised and the following ciphers have been chosen for the portfolio:Profile 1 (SW) Profile 2 (HW) HC-128 F-FCSR-H v2 Rabbit Grain v1 Salsa20/12 MICKEY v2 SOSEMANUK Trivium A short report on the portfolio and the end of eSTREAM can be found here.
We would like to thank everyone that contributed to eSTREAM in any way. For the future, we expect that research on the eSTREAM submissions in general, and the portfolio ciphers in particular, will continue. It is therefore possible that changes to the eSTREAM portfolio might be needed in the future. If so, any future revisions will continue to be made available via these pages.
SASC 2008
Call for participation [PDF] (submission deadline: January 11, 2008)
Workshop website: http://www.ecrypt.eu.org/stvl/sasc2008/On February 13 - February 14, 2008, a special workshop hosted by the ECRYPT Network of Excellence will be held in Lausanne, Switzerland (just after the FSE workshop). SASC 2008 will provide a forum for the exchange of ideas about all aspects of stream ciphers. Particular attention will be focused on submissions to eSTREAM and we expect papers and discussions at SASC 2008 to be helpful in identifying the most promising stream ciphers in the final phase.
Beginning of Phase 3 (April 2007)
The phase 3 candidates can be found here.eSTREAM Phase 2 Report
The eSTREAM Phase 2 report is available here.End of eSTREAM Phase 2
Phase 2 of eSTREAM has now officially ended. eSTREAM announces a list of algorithms that can move forward into Phase 3. More information can be found here.Update on eSTREAM and SASC 2007
The next steps in eSTREAM are outlined here.SASC 2007
Call for papers [PDF] (submission deadline: January 2, 2007)
Workshop website: http://sasc.crypto.rub.de
On January 31 - February 1, 2007, a special workshop hosted by the ECRYPT Network of Excellence will be held in Bochum, Germany. The goal of the SASC 2007 workshop is to gather researchers working in the area of stream cipher analysis and design.
The workshop is an activity of ECRYPT's STVL - Symmetric Techniques Virtual Lab. In particular, the workshop is focused on researchers participating in ECRYPT's eSTREAM project, in which 34 new stream cipher proposals are currently evaluated with respect to their security and performance.
The main goal of this workshop is to give participants the opportunity to give talks, present their research and discuss various aspects of the eSTREAM project.Beginning of Phase 2 (August 1st, 2006)
Phase 2 of eSTREAM has now officially started. eSTREAM announces a list of algorithms that have moved forward into Phase 2. More information on the (possible tweaked) phase 2 candidates can be found here.Next Re-classification (August 1st, 2006)
The classification of Phase 2 algorithms is an ongoing process. We intend to review the Phase 2 algorithms at six month intervals.End of eSTREAM Phase 1 (March 27th, 2006)
Phase 1 of eSTREAM has now officially ended. eSTREAM announces a list of algorithms that can move forward into Phase 2. More information can be found here.eSTREAM Software Performance testing is online (November 7th, 2005)
One of the requirements imposed on all eSTREAM stream cipher submissions was that they should demonstrate the potential to be superior to the AES in at least one significant aspect. An aspect which is particularly significant for Profile I candidates is software performance. Software performance can be measured in many different ways, and in order to make comparisons as fair as possible, eSTREAM has decided to develop a testing framework. This testing framework and documentation is now available here .
The framework has two objectives:- assuring that all stream cipher proposals are submitted to the same tests under the same circumstances
- automating the test procedure as much as possible such that new optimized implementations can be included and tested with as little effort as possible.
We refer to the eSTREAM Update 1, Section 4 for more explanations about the aim of the software performance testing. Please note that we have extended the deadline to submit optimized code until January 6th, 2006.SASC 2006 - Stream Ciphers Revisited
On February 2-3, 2006, a special workshop hosted by the ECRYPT Network of Excellence will be held in Leuven, Belgium. The goal of the SASC 2006 workshop is to gather researchers working in the area of stream cipher analysis and design.
The workshop is an activity of ECRYPT's STVL - Symmetric Techniques Virtual Lab. In particular, the workshop is focused on researchers participating in ECRYPT's eSTREAM project, in which 34 new stream cipher proposals are currently evaluated with respect to their security and performance.
The main goal of this workshop is to give participants the opportunity to give talks, present their research and discuss various aspects of the eSTREAM project. You can find the site for this workshop here.Submissions claiming suitability for both Profile I and Profile II (October 1st, 2005)
12 submissions to eSTREAM claim to be suitable for both Profile I and Profile II. Submitters should note that the key and IV length requirements are different for these profiles. While many submissions explicitly state (for instance) how an 80-bit key is to be accommodated, several do not. Since all submitters must explicitly describe how the appropriate key and IV lengths are to be handled, an updated description may be required for some ciphers. These should be submitted by December 31, 2005 so that all documentation is complete and correct.Hardware performance (October 1st, 2005)
Designers that claim their ciphers are suitable for Profile II or for Profiles I and II simultaneously are strongly encouraged to provide evidence for their claim. In moving from Phase I to Phase II, the hardware suitability of these proposals will be considered. Experimental or theoretical justification for the value of a proposal in hardware is therefore strongly encouraged.Update on the eSTREAM project (September 2nd, 2005)
We have uploaded a document addressing some of the issues that have arisen during the first few months of eSTREAM. This document can be obtained by clicking here. Please feel free to get in touch if you have any queries or comments but, in the meantime, thank you to everyone that has contributed to the project so far.On Updating Algorithms (July 18th, 2005)
ECRYPT has received several requests to update submitted designs that are published on this website. However, we cannot accommodate such changes. As well as the increased difficulty in managing additional versions of an algorithm, we feel that some stability is necessary to encourage cryptanalysis of the proposals. Therefore, since June 13th 2005 (when the website was launched), ECRYPT has refused any changes to the primitives available for download. The only exception to this has been the correction of significant and misleading typos in the documentation. Even then, designers have been encouraged to post a note to the discussion forum to explain the changes. Note: A major algorithmic weakness is not a typo!
Authors can, however, advertise intended changes to an algorithm. Replies to cryptanalysis results or proposals to change an algorithm can be summarised in a document and uploaded to the ECRYPT site. In this way these new contributions will be freely available as technical papers (just like the cryptanalysis papers). To bring attention to such postings and to provide additional justification, authors are encouraged to post a note to the discussion forum.