COLLECTED BY
Organization:
Internet Archive
The Internet Archive discovers and captures web pages through many different web crawls.
At any given time several distinct crawls are running, some for months, and some every day or longer.
View the web archive through the
Wayback Machine.
Crawl of outlinks from wikipedia.org started February, 2012. These files are currently not publicly accessible.
The Wayback Machine - https://web.archive.org/web/20120717061847/http://www.ecrypt.eu.org/stream/call/
Call for Stream Cipher Primitives
Version 1.3
12th April 2005
Introduction
The ECRYPT NoE plans to manage and co-ordinate a multi-year effort to identify
new stream ciphers suitable for widespread adoption. To launch this initiative,
algorithm designers are invited to submit new stream cipher proposals to the ECRYPT
Stream Cipher project; more information and detailed submission requirements are
provided below.
The deadline for the submission of primitives will be April 29th 2005.
A workshop will be organised for submitters to present their primitives on
26-27th May 2005 in Denmark, right after Eurocrypt.
The
website of this workshop (SKEW) can be found here.
Important notice: If you would like to present your design at
the SKEW workshop, we request that submitters also send the paper
describing their algorithm (essentially part B of the formal
submission, cf. below) to the SKEW workshop. See the SKEW Call
for papers. You should send the paper describing your design by
April 30th to stvl2005@it.lth.se .
The ECRYPT NoE is not a standardisation body. Instead the
ECRYPT NoE will centrally pool and manage information related to
submitted stream cipher proposals.
This resource will be available to developers, implementers, and researchers alike and consist
of specifications, implementation information, and research results.
Throughout the duration of the project, comments from industry and the results of work in
the research community will be sought and compiled. At notable points during the process
ECRYPT will prepare and publish updates on the progress of the submitted algorithms.
There will be two phases to the ECRYPT Stream Cipher project. The first phase
will concentrate on accumulating information related to the submitted stream ciphers. At
the end of the first phase, it is likely that a subset of the first phase
ciphers will be advanced to the second phase. This will provide further focus to ongoing
analysis within the cryptographic
community. Since the goal of the project is to derive good stream ciphers,
it is likely that potentially significant "tweaks"
will be permitted in moving to the second phase.
ECRYPT is a Network of Excellence within the Information Societies
Technology (IST) Programme of the European Commission.
Background
The cryptographic community is well served by a variety of efficient and trusted block ciphers.
However the same does not seem to hold for stream
ciphers. Following public discussions at the
State of the Art of Stream Ciphers (SASC) Workshop in
Brugge (October 14-15, 2004) the ECRYPT NoE would like to solicit stream cipher proposals suited to at
least one of the stream cipher PROFILES listed below:
- PROFILE 1.
- Stream ciphers for software applications with high throughput requirements.
- PROFILE 2.
- Stream ciphers for hardware applications with restricted resources such as
limited storage, gate count, or power consumption.
Some have emphasized the importance of including an authentication method and so two
further profiles are also proposed:
- PROFILE 1A.
- Stream ciphers satisfying PROFILE 1 with an associated authentication method.
- PROFILE 2A.
- Stream ciphers satisfying PROFILE 2 with an associated authentication method.
REMARK: Since the first publication of this call for primitives, a
paper was published by Hong and Sarkar about time-memory-data
tradeoffs on
eprint. These issues are certainly an interesting topic of
discussion for the upcoming ECRYPT workshops.
The ECRYPT NoE will not make any formal evaluation of the submissions. Rather the ECRYPT NoE
will accumulate and package together results related to submissions. Thus, it is the
input of the cryptographic community at large that will point to the most suitable stream
cipher from the pool.
The main evaluation criteria are likely to be
long-term security, efficiency (performance), flexibility and market requirements.
- Security is the most important criterion since it is essential to achieve
confidence and build consensus.
- The performance of the primitive in the specified
environment is important. For software, the range of environments may include
8-bit processors (as found in inexpensive smart cards), 32-bit processors
(e.g., the Pentium family) to the modern 64-bit processors. For
hardware, both FPGAs and ASICs may be considered.
- We anticipate that different ciphers will perform best against different profiles; however,
within any one profile, some flexibility of implementation is likely to be important, so
that the range of environments in which it can be used is not unnecessarily restricted.
- Market requirements are related to the need for a primitive, its usability, and the
possibility for world-wide use.
Security Criteria
- Any key-recovery attack (including time-memory-data tradeoff attacks) should be at least as
difficult as exhaustive search.
- Also, distinguishing attacks are likely to be of interest to the
cryptographic community. However the relative importance of high
complexity distinguishing attacks may become an issue for wider
discussion.
- Clarity of design is likely to be an important consideration.
Implementation Criteria
- Software and hardware efficiency will be compared with similar submissions
and existing primitives.
- Execution code and memory sizes will be assessed according to their
relevance in different contexts.
- Submitted primitives will be assessed against claimed performance, though
it is clearly preferable for primitives to offer wide flexibility of use.
Licensing Requirements
- The submitter should state the position concerning intellectual
property. This statement should be updated when necessary.
Provisional Timetable
2004 |
November |
Call for Cryptographic Primitives |
2005 |
April 29 |
Submission deadline |
2005 |
May 26-27 |
Stream cipher workshop |
2006 |
February |
End of first phase. |
2006 |
July |
Beginning of second phase. |
2007 |
September |
End of second phase. |
2008 |
January |
Final report of ECRYPT Stream Cipher project |
Submission Requirements
For the ECRYPT NoE a stream cipher takes as input
- A message stream (M),
- A key (K),
- An initial value (IV),
- Optionally for PROFILES that provide authentication, some associated data (AD).
For the ECRYPT NoE a stream cipher gives as output
- A ciphertext stream (C),
- For PROFILES providing authentication, an authentication tag (AU),
- Optionally for PROFILES that provide authentication, authenticated but unencrypted associated data (AU-AD).
For stream ciphers without an authentication mechanism, the required parameter values are given below.
- PROFILE 1.
- A key length of 128 bits must be accommodated.
- An IV length of at least one of 64 or 128 bits must be accommodated.
- PROFILE 2.
- A key length of 80 bits must be accommodated.
- An IV length of at least one of 32 or 64 bits must be accommodated.
For stream ciphers with an authentication mechanism, the required parameter values are given below.
- PROFILE 1A.
- A key length of 128 bits must be accommodated.
- An IV length of at least one of 64 or 128 bits must be accommodated.
- An authentication tag length of at least one of 32, 64, 96, or 128 bits must be accommodated.
- PROFILE 2A.
- A key length of 80 bits must be accommodated.
- An IV length of at least one of 32 or 64 bits must be accommodated.
- An authentication tag length of at least one of 32 or 64 bits must be accommodated.
The following additional information might be useful.
- A stream cipher can be either synchronous or self-synchronising.
- While some IV sizes are specified as must-satisfy values, the ability to handle
smaller IV spaces without hindering performance would be welcome.
- For any PROFILE it is likely that the stream cipher must be demonstrably
superior to the AES in at least one significant aspect.
Here we assume that the AES is used in some appropriate mode (e.g. counter mode).
- Time-memory trade-offs mean that the size of the stream cipher state
should be appropriate for the claimed
security level. For instance, the state size should be at least twice the key size.
- While attacks such as related-key attacks might not be directly addressed, they would be of considerable
relevance to the ongoing assessment of the cipher.
- Issues such as side-channel analysis and secure implementation are likely to be a relevant consideration.
- In addition to theoretic estimations of the security of a cipher, full cost estimates of attacks might also
be considered.
Formal Submission Requirements
The following are to be provided with any submission:
A. Cover sheet with the following information:
- Name of submitted algorithm
- Type of submitted algorithm, proposed security level, and proposed
environment.
- Principal submitter's name, telephone, fax, organization, postal address,
e-mail address
- Name(s) of auxiliary submitter(s)
- Name of algorithm inventor(s)/developer(s)
- Name of owner, if any, of the algorithm (normally expected to be the same
as the submitter)
- Signature of submitter
- (optional) Backup point of contact (telephone, fax, postal address,
e-mail)
B. Primitive specification and supporting documentation
- A complete and unambiguous description of the primitive in the most
suitable forms, such as a mathematical description, a textual description
with diagrams, or pseudo-code. The specification of a primitive using
code is not permitted. Input and output should be in the form of
binary strings. For asymmetric algorithms, a method for key generation
and parameter selection needs to be specified.
- A statement that there are no hidden weaknesses inserted by the
designers.
- A statement of the claimed security properties and expected security
level, together with an analysis of the primitive with respect to standard
cryptanalytic attacks. Weak keys should also be considered.
- A statement giving the strengths and advantages of the primitive.
- A design rationale explaining design choices.
- A statement of the estimated computational efficiency in software.
Estimates are required for different sub-operations like key setup,
primitive setup, and encryption/decryption (as far as applicable). The
efficiency should be estimated both in cycles per byte and cycles per block,
indicating the processor type and memory. If performance varies with the
size of the inputs, then values for some typical sizes should be
provided. Optionally the designers may provide estimates for
performance in hardware (area, speed, gate count, a description in VHDL).
- A description of the basic techniques for implementers to avoid
implementation weaknesses.
C. Implementations and test values
- A reference implementation in portable
C. The ECRYPT NoE specifies the following API.
- A sufficient number of test vectors.
- Optionally, an optimized implementation for some architectures, a JAVA
implementation, an assembly language implementation.
D. Intellectual property statement
- A statement that gives the position concerning intellectual
property position and the royalty policy for the primitive.
- This statement should include an undertaking to update the
ECRYPT Stream Cipher project when necessary.
Requirements:
- Items A, B, and D shall be supplied in paper form and in electronic form
(Adobe PDF or PostScript).
- Item C shall be supplied in electronic form only.
- Item A, B, C and D shall be clearly labelled and supplied on one CD.
The CD shall contain an ASCII file labeled
"README", that lists all files included on the CD and provides a brief
description of the content of each file.
- All submissions must be in English.
- Designers cannot ask for their design to remain secret, as
ECRYPT intends public evaluation of the designs.
- Submissions should be sent to the following address:
Prof. Bart Preneel
ECRYPT NoE Project Coordinator
K.U. Leuven
Kasteelpark Arenberg 10
B-3001 Leuven-Heverlee
BELGIUM
- Submissions should arrive on or before 29th April 2005.
An acknowledgment of receipt will be sent by email and also regular
mail if requested.
Further Information
Email: streamciphercall@ecrypt.eu.org.
Website: http://www.ecrypt.eu.org.