Document Type : Review Article

Author

Abstract

Stream ciphers are an important class of symmetric cryptographic algorithms. The eSTREAM project contributed significantly to the recent increase of activity in this field. In this paper, we present a survey of the eSTREAM project. We also review recent time/memory/data and time/memory/key trade-offs relevant for the generic attacks on stream ciphers.

Keywords

 [1] Steve Babbage, A Space/Time Tradeoff in Exhaustive Search Attacks on Stream Ciphers, European Convention on Security and Detection, Volume 408, 1995.
[2] Dan J. Bernstein, Understanding Brute Force, Workshop on Symmetric Key Encryption (SKEW 2005), Århus, May 27th, 2005. http://cr.yp.to/talks/2005.05.27/slides.pdf
[3] Alex Biryukov, Sourav Mukhopadhyay, Palash Sarkar, Improved Time-Memory Trade-offs with Multiple Data, Selected Areas in Cryptography (SAC 2005), LNCS 3897, pages 110-127, Springer-Verlag, 2006.
[4] Alex Biryukov, Adi Shamir, Cryptanalytic Time/Memory/Data Tradeoffs for Stream Ciphers, ASIACRYPT 2000, LNCS 1976, pages 1-13, Springer-Verlag, 2000.
[5] Nicolas Courtois, Fast Algebraic Attacks on Stream Ciphers with Linear Feedback, CRYPTO 2003, LNCS 2729, pages 176-194, Springer- Verlag, 2003.
[6] Joan Daemen, René Govaerts, Joos Vandewalle, Resynchronization Weaknesses in Synchronous Stream Ciphers, EUROCRYPT 1993, LNCS 765, pages 159-167, Springer-Verlag, 1994.
[7] Jovan Dj. Golić, Correlation via Linear Sequential Circuit Approximation of Combiners with Memory, EUROCRYPT 1992, LNCS 658, pages 113-123, Springer-Verlag, 1993.
[8] Jovan Dj. Golić, Linear Cryptanalysis of Stream Ciphers, Fast Software Encryption (FSE 1994), LNCS 1008, pages 154-169, Springer-Verlag,
1995.
[9] Jovan Dj. Golić, Cryptanalysis of Alleged A5 Stream Cipher, EUROCRYPT 1997, LNCS 1233, pages 239-255, Springer-Verlag, 1997.
[10] Martin Hellman, A Cryptanalytic Time-Memory Trade-off, IEEE Transactions on Information Theory, Volume 26, pages 401-406, 1980.
[11] Jin Hong, Palash Sarkar, New Applications of Time Memory Data Trade-offs, ASIACRYPT 2005, LNCS 3788, pages 353-372, Springer-Verlag, 2005.
[12] Willi Meier, Othmar Staffelbach, Fast Correlation Attacks on Certain Stream Ciphers, J. Cryptology Vol. 1, No. 3, pages 159-176, 1989.
[13] Alfred J. Menezes, Paul C. van Oorschot, Scott A. Vanstone, Handbook of Applied Cryptography, CRC Press, 1996.
[14] Matthew Robshaw, Olivier Billet, New Stream Cipher Designs, LNCS 4986, 2008.
[15] Steve Babbage, Christophe de Canniére, Anne Canteaut, Carlos Cid, Henri Gilbert, Thomas Johansson, Christof Paar, Matthew Parker, Bart Preneel, Vincent Rijmen, Matt Robshaw, Hongjun Wu, eSTREAM, Short Report on the End of the Second Phase, http://www.ecrypt.eu.org/stream/PhaseIIreport.pdf
[16] Steve Babbage, Christophe De Cannière, Anne Canteaut, Carlos Cid, Henri Gilbert, Thomas Johansson, Matthew Parker, Bart Preneel, Vincent Rijmen, Matthew Robshaw, The eSTREAM Portfolio, http://www.ecrypt.eu.org/stream/portfolio.pdf
[17] Tim Good, Escargot, http://www.shef.ac.uk/eee/escargot/