- This page was last modified on 9 August 2025, at 06:58. Suggest an edit.
eSTREAM facts for kids
eSTREAM was a special project that aimed to find new ways to keep digital information secret. Think of it like finding the best secret codes! This project was organized by a group called ECRYPT from the EU. It started in November 2004 and finished in April 2008. The main goal was to discover "stream ciphers" that could be used widely. Stream ciphers are a type of secret code that encrypts data one bit or byte at a time, like a stream of water. The project was needed because earlier attempts to find good stream ciphers had not worked out.
Contents
What eSTREAM Looked For
The eSTREAM project had two main goals, or "profiles," for the secret codes they were looking for:
- Profile 1: These were codes designed for computer programs. They needed to be super fast at encrypting and decrypting lots of data. Imagine sending a huge file quickly and securely!
- Profile 2: These codes were for small electronic devices, like smart cards or tiny sensors. They needed to work well even with limited power, memory, or processing power.
Some codes also offered an extra feature called "authentication." This means they could not only encrypt data but also prove that the data had not been changed. However, in the final stages, the project focused only on encryption for better speed.
The Best Secret Codes from eSTREAM
By September 2011, eSTREAM had chosen a group of top-performing secret codes. These codes are now part of the "eSTREAM portfolio." They are all free for anyone to use! One of them, called Rabbit, used to have a patent, but it was made free for everyone in October 2008.
Here are some of the codes chosen:
Profile 1 (for computers) | Profile 2 (for small devices) |
---|---|
HC-128 | Grain |
Rabbit | MICKEY |
Salsa20/12 | Trivium |
SOSEMANUK |
Originally, another code called F-FCSR was also in the Profile 2 list. But later, experts found some weaknesses in it. So, in September 2008, F-FCSR was removed from the official list.
How the Project Worked: Different Phases
The eSTREAM project was divided into several stages, or "phases," to carefully test and choose the best codes.
Phase 1: The First Look
Phase 1 was all about checking out all the submitted secret codes. Experts looked at how secure they were, how fast they ran compared to other codes like AES (a well-known US standard), how simple they were to use, and how well they were explained.
For codes in Profile 1 (for computers), they had to be faster than AES-128 when used in a specific way called "counter mode." The project also created special tools to test how well these codes performed on different computer systems. Phase 1 officially ended on March 27, 2006.
Phase 2: Deeper Dive
Phase 2 began on August 1, 2006. In this phase, some codes were chosen as "Focus Phase 2 algorithms." This meant they were extra interesting, and experts were encouraged to study them even more closely to find any weaknesses or improve their speed. Other codes were still considered valid candidates, but not as intensely studied. The "Focus" list was updated every six months.
Phase 3: The Final Choice
Phase 3 started in April 2007. This was the last stage before the final selection. Many codes were still being considered for both profiles.
Here are some of the codes that made it to Phase 3:
- CryptMT (version 3)
- Dragon
- HC (HC-128 and HC-256)
- LEX (LEX-128, LEX-192 and LEX-256)
- NLS (encryption only)
- Rabbit
- Salsa20/12
- SOSEMANUK
- DECIM (DECIM v2 and DECIM-128)
- F-FCSR (F-FCSR-H v2 and F-FCSR-16)
- Grain (Grain v1 and Grain-128)
- MICKEY (MICKEY 2.0 and MICKEY-128 2.0)
- Moustique, Pomaranch (version 3)
- Trivium
Phase 3 wrapped up on April 15, 2008. That's when the final list of chosen codes for the eSTREAM portfolio was announced.
- For Profile 1 (software): HC-128, Rabbit, Salsa20/12, and SOSEMANUK.
- For Profile 2 (hardware): F-FCSR-H v2, Grain v1, Mickey v2, and Trivium.
More About the Codes
The eSTREAM project looked at many different secret codes. Here's a quick guide to what the symbols in the tables below mean:
Key | |
---|---|
P | This code is in the eSTREAM official list. |
This code used to be in the eSTREAM official list but was removed. | |
3 | This code made it to Phase 3 of the project. |
F | This code was a "Focus Phase 2" candidate, meaning it was studied very closely. |
2 | This code was a "Phase 2" candidate. |
A | This code was "archived," meaning it was kept for reference but not actively considered. |
M | This code also includes a way to check if data has been changed (a MAC). |
pat | This code had a patent, so you might need a license to use it. |
This code used to have a patent but is now free for everyone to use. |
Codes in the eSTREAM Official List
As of January 2012, these are the codes in the eSTREAM portfolio:
Profile 1 (for computers) |
Profile 2 (for small devices) |
---|---|
Uses a 128-bit key | Uses an 80-bit key |
HC-128 | Grain v1 |
Rabbit | MICKEY 2.0 |
Salsa20/12 | Trivium |
SOSEMANUK | - |
Some of these codes also have versions that use longer keys, which can make them even more secure:
Profile 1 (for computers) |
Profile 2 (for small devices) |
---|---|
Uses a 256-bit key | Uses a 128-bit key |
HC-256 | - |
- | MICKEY-128 2.0 |
Salsa20/12 | - |
- | - |
It's worth noting that a 128-bit version of Grain v1 is no longer supported by its creators. A newer version, Grain-128a, exists, but it's not part of the official eSTREAM portfolio.
Here's a table showing more details about the codes in the eSTREAM portfolio as of December 2008:
Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Creators |
---|---|---|---|---|---|
Grain | [1] | PF | Martin Hell, Thomas Johansson and Willi Meier | ||
HC-256 (HC-128, HC-256) | [2] | PF | Hongjun Wu | ||
MICKEY (MICKEY 2.0, MICKEY-128 2.0) | [3] | PF | Steve Babbage and Matthew Dodd | ||
Rabbit | [4] | P | 2 | Martin Boesgaard, Mette Vesterager, Thomas Christensen and Erik Zenner | |
Salsa20 | [5] | PF | 2 | Daniel J. Bernstein | |
SOSEMANUK | [6] | P | Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert |
||
Trivium | [7] | PF | Christophe De Cannière and Bart Preneel |
Codes No Longer in the Official List
This code was in the first official list but was removed in September 2008 because weaknesses were found.
Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Creators |
---|---|---|---|---|---|
F-FCSR (F-FCSR-H v2, F-FCSR-16) | [8] | Thierry Berger, François Arnault and Cédric Lauradoux |
Codes That Made it to Phase 3 but Not the Final List
These codes were strong enough to reach Phase 3 but were not chosen for the final eSTREAM portfolio.
Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Creators |
---|---|---|---|---|---|
CryptMT (version 3) | [9] | 3 | pat | Makoto Matsumoto, Hagita Mariko, Takuji Nishimura and Matsuo Saito |
|
DECIM (DECIM v2, DECIM-128) | [10] | 3 | pat | Come Berbain, Olivier Billet, Anne Canteaut, Nicolas Courtois, Blandine Debraize, Henri Gilbert, Louis Goubin, Aline Gouget, Louis Granboulan, Cédric Lauradoux, Marine Minier, Thomas Pornin and Hervé Sibert |
|
Dragon | [11] | 3F | Ed Dawson, Kevin Chen, Matt Henricksen, William Millan, Leonie Simpson, HoonJae Lee, SangJae Moon |
||
Edon80 | [12] | 3 | Danilo Gligoroski, Smile Markovski, Ljupco Kocarev and Marjan Gusev |
||
LEX | [13] | 3F | 2 | Alex Biryukov | |
MOSQUITO (aka Moustique) | [14] | 3 | Joan Daemen and Paris Kitsos | ||
NLS (encryption-only) | [15] | 3 | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries |
||
Pomaranch (version 3) | [16] | 3 | Tor Helleseth, Cees Jansen and Alexander Kolosha |
Codes That Were Focus Candidates in Phase 2 but Not Phase 3
These codes were studied very closely in Phase 2 but did not move on to Phase 3.
Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Creators |
---|---|---|---|---|---|
Phelix | [17] | F | F | M | Doug Whiting, Bruce Schneier, Stefan Lucks and Frédéric Muller |
Py | [18] | F | Eli Biham and Jennifer Seberry |
Codes That Were Phase 2 Candidates but Not Focus or Phase 3
These codes were considered valid candidates in Phase 2 but did not become "focus" candidates or move to Phase 3.
Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Creators |
---|---|---|---|---|---|
ABC | [19] | 2 | Vladimir Anashin, Andrey Bogdanov, Ilya Kizhvatov and Sandeep Kumar |
||
Achterbahn | [20] | 2 | Berndt Gammel, Rainer Göttfert and Oliver Kniffler | ||
DICING | [21] | 2 | Li An-Ping | ||
Hermes8 | [22] | A | 2 | Ulrich Kaiser | |
NLS | [23] | 2 | 2 | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries |
|
Polar Bear | [24] | 2 | 2 | Johan Håstad and Mats Näslund | |
Pomaranch | [25] | A | 2 | Cees Jansen and Alexander Kolosha | |
SFINKS | [26] | 2 | M | An Braeken, Joseph Lano, Nele Mentens, Bart Preneel and Ingrid Verbauwhede |
|
TSC-3 | [27] | 2 | Jin Hong, Dong Hoon Lee, Yongjin Yeom, Daewan Han and Seongtaek Chee |
||
VEST | [28] | 2 | M pat | Sean O'Neil, Benjamin Gittins and Howard Landman | |
WG | [29] | 2 | Guang Gong and Yassir Nawaz | ||
Yamb | [30] | 2 | 2 | LAN Crypto | |
ZK-Crypt | [31] | 2 | M pat | Carmi Gressel, Ran Granot and Gabi Vago |
Codes Not Selected for Focus or Phase 2
These codes were submitted but did not advance far in the selection process.
Cipher | eSTREAM webpage |
Profile 1 (software) |
Profile 2 (hardware) |
Properties | Creators |
---|---|---|---|---|---|
Frogbit | [32] | A | M pat | Thierry Moreau | |
Fubuki | [33] | A | pat | Makoto Matsumoto, Hagita Mariko, Takuji Nishimura and Matsuo Saito |
|
MAG | [34] | A | A | Rade Vuckovac | |
Mir-1 | [35] | A | Alexander Maximov | ||
SSS | [36] | A | A | M | Gregory Rose, Philip Hawkes, Michael Paddon and Miriam Wiggers de Vries |
TRBDK3 YAEA | [37] | A | A | Timothy Brigham |
See also
- AES process
- CAESAR Competition – Another competition for secure codes
- NESSIE
- CRYPTREC
External links
- Homepage for the project
- Discussion forum
- The eSTREAM testing framework eSTREAM Optimized Code HOWTO
- Update 1: (PDF)
- Notes on the ECRYPT Stream Cipher project by Daniel J. Bernstein
de:Stromverschlüsselung#eSTREAM