Section: Overall Objectives
Selection of two stream ciphers designed by the project-team in the final eSTREAM portfolio of recommended ciphers (http://www.ecrypt.eu.org/stream/portfolio.pdf ).eSTREAM is a multi-year project running from 2004 to 2008, launched by the European network of excellence ECRYPT, to identify new stream ciphers that might become suitable for widespread adoption (http://www.ecrypt.eu.org/stream/ ). The project-team was involved in the design of 3 new stream ciphers which have been submitted to eSTREAM (among 34 candidates): Sosemanuk , DECIM and F-FCSR. These three proposals belong to the 18 Phase-3 ciphers. In April 2008, Sosemanuk and F-FCSR have been chosen in the final selection, which consists of 8 recommended ciphers.
Design of two new hash functions which have been submitted to the SHA-3 competition.This international competition, launched by the American National Institute of Standards and Technology, aims at selecting a new standard for hash functions (http://csrc.nist.gov/groups/ST/hash/sha-3/ ). The revision of the current standard FIPS 180-2 has actually been decided by NIST in response to the recent attacks against almost all existing hash functions (e.g. MD5, SHA-0, SHA-1). The new hash algorithm, referred to as “SHA-3”, will be developed through a public competition, much like the development of the AES. The deadline for submitting a candidate was October 31, 2008. Among the 64 proposed candidates, two of them, named FSB and Shabal, have been proposed by the project-team. Moreover, we have broken two of the submitted proposals, Ponic and MCSSHA-3.
Reference implementations of code-based cryptosystems.The first open-source reference implementations of code-based cryptography, namely of two versions McEliece public-key cipher and of the FSB hash function, have been written within the project-team and have been made publicly available. The implementation of McEliece cryptosystem has been included in the benchmarking tool SUPERCOP (System for Unified Performance Evaluation Related to Cryptographic Operations and Primitives) developed within the European network of excellence ECRYPT (http://bench.cr.yp.to/ ).