1090:
122:
ACHTERBAHN-128 is downward compatible and can produce the same keystream as ACHTERBAHN-80 if so desired. The keystream generator of ACHTERBAHN-128/80 is based on the design principle of the nonlinear combination generator, however it deploys primitive nonlinear feedback shift registers
155:
The ACHTERBAHN-128/80 stream cipher is optimized for hardware applications with restricted resources, such as limited gate count and power consumption. An implementation of ACHTERBAHN-80 has a design size of only 2188 gate equivalents (Nand-GE) in a standard
160:
technology and delivers a throughput of up to 400 Megabit/s. This makes it suitable for RFID tags. A high-speed implementation with a throughput of 8 Gigabit/s has a design size of 8651 Nand-GE.
234:. Research in Cryptology: Second Western European Workshop, WEWoRC. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4945. Bochum, Germany: Springer. pp. 142–152.
1070:
900:
204:. Fast Software Encryption, 14th International Workshop. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4593. Luxembourg: Springer. pp. 73–86.
147:) lengths are used in a communication protocol. The cipher's authors recommend a maximum frame length of 2 bits. This value does however not imply practical limitations.
337:
M.I. Mahmoud et.al.: Wavelet Data Hiding using
Achterbahn-128 on FPGA Technology, UbiCC Journal - Special Issue of IKE'07 Conference, IKE'07 - Special Issue, 1/15/2008
753:
371:
46:, because it supports the key lengths of 80 bits and 128 bits, respectively. Achterbahn was developed by Berndt Gammel, Rainer Göttfert and Oliver Kniffler.
616:
290:
239:
209:
285:. Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks. Solstrand, Norway. pp. 91–95.
277:
261:. Workshop Record of The State of the Art of Stream Ciphers - SASC. Ruhr University Bochum, Germany. pp. 152–165. Archived from
746:
678:
364:
256:
144:
949:
673:
663:
739:
357:
1065:
1020:
833:
139:
There are no known cryptanalytic attacks against ACHTERBAHN-128/80 for the tabulated parameters that are faster than
944:
647:
307:
1060:
1050:
1040:
895:
642:
1118:
1045:
1035:
838:
798:
791:
781:
776:
786:
178:
1093:
939:
885:
714:
688:
541:
1055:
979:
709:
276:
Göttfert, Rainer; Gammel, Berndt M. (July 1–6, 2007). Helleseth, T.; Kumar, V.; Ytrehus, Ø. (eds.).
818:
637:
924:
908:
855:
704:
140:
984:
974:
845:
286:
235:
205:
919:
486:
606:
601:
576:
450:
226:
196:
994:
914:
875:
823:
808:
668:
521:
476:
262:
1112:
1075:
1030:
989:
969:
865:
828:
803:
621:
581:
561:
551:
516:
380:
28:
1025:
870:
860:
850:
813:
762:
20:
1004:
556:
414:
964:
934:
929:
890:
683:
331:
255:
Gammel, Berndt M.; Göttfert, Rainer; Kniffler, Oliver (Jan 31 – Feb 1, 2007).
58:, which indicates that the cipher can encrypt eight bit streams in parallel.
954:
596:
526:
460:
31:
336:
999:
959:
409:
455:
429:
404:
35:
306:
Gammel, Berndt M.; Göttfert, Rainer; Kniffler, Oliver (30 June 2006).
177:
Gammel, Berndt M.; Göttfert, Rainer; Kniffler, Oliver (30 June 2006).
880:
546:
511:
481:
445:
143:. Recent analysis showed that attacks are possible if larger frame (
39:
591:
228:
Cryptanalysis of
Achterbahn-128/80 with a New Keystream Limitation
124:
611:
586:
536:
531:
399:
394:
157:
128:
735:
353:
61:
The parameters of the cipher are given in the following table:
54:(in German), though a literal translation of the term would be
571:
566:
419:
42:
network. In the final specification the cipher is called
901:
Cryptographically secure pseudorandom number generator
341:
1013:
769:
697:
656:
630:
499:
469:
438:
428:
387:
747:
365:
8:
195:Naya-Plasencia, María (March 26–28, 2007).
754:
740:
732:
435:
372:
358:
350:
346:
342:
279:On the frame length of Achterbahn-128/80
225:Naya-Plasencia, María (July 4–6, 2007).
63:
169:
258:Achterbahn-128/80: Design and Analysis
184:. ECRYPT Stream Cipher Project Report.
7:
198:Cryptanalysis of Achterbahn-128/80
14:
1089:
1088:
950:Information-theoretic security
1:
27:is the name of a synchronous
664:block ciphers in stream mode
315:The Achterbahn Stream Cipher
1066:Message authentication code
1021:Cryptographic hash function
834:Cryptographic hash function
109:
98:
87:
76:
66:
1135:
945:Harvest now, decrypt later
648:alternating step generator
127:) instead of linear ones (
1084:
1061:Post-quantum cryptography
731:
349:
345:
1051:Quantum key distribution
1041:Authenticated encryption
896:Random number generation
643:self-shrinking generator
1046:Public-key cryptography
1036:Symmetric-key algorithm
839:Key derivation function
799:Cryptographic primitive
792:Authentication protocol
782:Outline of cryptography
777:History of cryptography
787:Cryptographic protocol
940:End-to-end encryption
886:Cryptojacking malware
715:stream cipher attacks
1056:Quantum cryptography
980:Trusted timestamping
710:correlation immunity
332:Achterbahn home page
819:Cryptographic nonce
638:shrinking generator
388:Widely used ciphers
308:"ACHTERBAHN-128/80"
179:"ACHTERBAHN-128/80"
925:Subliminal channel
909:Pseudorandom noise
856:Key (cryptography)
705:correlation attack
141:brute force attack
99:Max. frame length
1106:
1105:
1102:
1101:
985:Key-based routing
975:Trapdoor function
846:Digital signature
727:
726:
723:
722:
495:
494:
292:978-1-4244-1199-3
265:on July 24, 2007.
241:978-3-540-88352-4
211:978-3-540-74617-1
120:
119:
44:ACHTERBAHN-128/80
34:submitted to the
1126:
1092:
1091:
920:Insecure channel
756:
749:
742:
733:
436:
374:
367:
360:
351:
347:
343:
319:
318:
312:
303:
297:
296:
284:
273:
267:
266:
252:
246:
245:
233:
222:
216:
215:
203:
192:
186:
185:
183:
174:
77:Max. key length
64:
1134:
1133:
1129:
1128:
1127:
1125:
1124:
1123:
1109:
1108:
1107:
1098:
1080:
1009:
765:
760:
719:
693:
652:
626:
491:
465:
424:
383:
378:
328:
323:
322:
310:
305:
304:
300:
293:
282:
275:
274:
270:
254:
253:
249:
242:
231:
224:
223:
219:
212:
201:
194:
193:
189:
181:
176:
175:
171:
166:
153:
137:
110:Internal state
88:Max. IV length
72:ACHTERBAHN-128
38:Project of the
17:
12:
11:
5:
1132:
1130:
1122:
1121:
1119:Stream ciphers
1111:
1110:
1104:
1103:
1100:
1099:
1097:
1096:
1085:
1082:
1081:
1079:
1078:
1073:
1071:Random numbers
1068:
1063:
1058:
1053:
1048:
1043:
1038:
1033:
1028:
1023:
1017:
1015:
1011:
1010:
1008:
1007:
1002:
997:
995:Garlic routing
992:
987:
982:
977:
972:
967:
962:
957:
952:
947:
942:
937:
932:
927:
922:
917:
915:Secure channel
912:
906:
905:
904:
893:
888:
883:
878:
876:Key stretching
873:
868:
863:
858:
853:
848:
843:
842:
841:
836:
826:
824:Cryptovirology
821:
816:
811:
809:Cryptocurrency
806:
801:
796:
795:
794:
784:
779:
773:
771:
767:
766:
761:
759:
758:
751:
744:
736:
729:
728:
725:
724:
721:
720:
718:
717:
712:
707:
701:
699:
695:
694:
692:
691:
686:
681:
676:
671:
669:shift register
666:
660:
658:
654:
653:
651:
650:
645:
640:
634:
632:
628:
627:
625:
624:
619:
614:
609:
604:
599:
594:
589:
584:
579:
574:
569:
564:
559:
554:
549:
544:
539:
534:
529:
524:
519:
514:
509:
503:
501:
497:
496:
493:
492:
490:
489:
484:
479:
473:
471:
467:
466:
464:
463:
458:
453:
448:
442:
440:
433:
426:
425:
423:
422:
417:
412:
407:
402:
397:
391:
389:
385:
384:
381:Stream ciphers
379:
377:
376:
369:
362:
354:
340:
339:
334:
327:
326:External links
324:
321:
320:
298:
291:
268:
247:
240:
217:
210:
187:
168:
167:
165:
162:
152:
149:
136:
133:
118:
117:
114:
111:
107:
106:
103:
100:
96:
95:
92:
89:
85:
84:
81:
78:
74:
73:
70:
69:ACHTERBAHN-80
67:
15:
13:
10:
9:
6:
4:
3:
2:
1131:
1120:
1117:
1116:
1114:
1095:
1087:
1086:
1083:
1077:
1076:Steganography
1074:
1072:
1069:
1067:
1064:
1062:
1059:
1057:
1054:
1052:
1049:
1047:
1044:
1042:
1039:
1037:
1034:
1032:
1031:Stream cipher
1029:
1027:
1024:
1022:
1019:
1018:
1016:
1012:
1006:
1003:
1001:
998:
996:
993:
991:
990:Onion routing
988:
986:
983:
981:
978:
976:
973:
971:
970:Shared secret
968:
966:
963:
961:
958:
956:
953:
951:
948:
946:
943:
941:
938:
936:
933:
931:
928:
926:
923:
921:
918:
916:
913:
910:
907:
902:
899:
898:
897:
894:
892:
889:
887:
884:
882:
879:
877:
874:
872:
869:
867:
866:Key generator
864:
862:
859:
857:
854:
852:
849:
847:
844:
840:
837:
835:
832:
831:
830:
829:Hash function
827:
825:
822:
820:
817:
815:
812:
810:
807:
805:
804:Cryptanalysis
802:
800:
797:
793:
790:
789:
788:
785:
783:
780:
778:
775:
774:
772:
768:
764:
757:
752:
750:
745:
743:
738:
737:
734:
730:
716:
713:
711:
708:
706:
703:
702:
700:
696:
690:
687:
685:
682:
680:
677:
675:
672:
670:
667:
665:
662:
661:
659:
655:
649:
646:
644:
641:
639:
636:
635:
633:
629:
623:
620:
618:
615:
613:
610:
608:
605:
603:
600:
598:
595:
593:
590:
588:
585:
583:
580:
578:
575:
573:
570:
568:
565:
563:
560:
558:
555:
553:
550:
548:
545:
543:
540:
538:
535:
533:
530:
528:
525:
523:
520:
518:
515:
513:
510:
508:
505:
504:
502:
500:Other ciphers
498:
488:
485:
483:
480:
478:
475:
474:
472:
468:
462:
459:
457:
454:
452:
449:
447:
444:
443:
441:
437:
434:
431:
427:
421:
418:
416:
413:
411:
408:
406:
403:
401:
398:
396:
393:
392:
390:
386:
382:
375:
370:
368:
363:
361:
356:
355:
352:
348:
344:
338:
335:
333:
330:
329:
325:
316:
309:
302:
299:
294:
288:
281:
280:
272:
269:
264:
260:
259:
251:
248:
243:
237:
230:
229:
221:
218:
213:
207:
200:
199:
191:
188:
180:
173:
170:
163:
161:
159:
150:
148:
146:
142:
134:
132:
130:
126:
115:
112:
108:
104:
101:
97:
93:
90:
86:
82:
79:
75:
71:
68:
65:
62:
59:
57:
53:
52:rollercoaster
49:
45:
41:
37:
33:
30:
29:stream cipher
26:
22:
16:Stream cipher
1026:Block cipher
871:Key schedule
861:Key exchange
851:Kleptography
814:Cryptosystem
763:Cryptography
506:
314:
301:
278:
271:
263:the original
257:
250:
227:
220:
197:
190:
172:
154:
138:
121:
60:
55:
51:
47:
43:
24:
21:cryptography
18:
1014:Mathematics
1005:Mix network
151:Performance
56:eight-track
965:Ciphertext
935:Decryption
930:Encryption
891:Ransomware
684:T-function
631:Generators
507:Achterbahn
164:References
48:Achterbahn
25:Achterbahn
955:Plaintext
597:SOBER-128
527:KCipher-2
461:SOSEMANUK
432:Portfolio
32:algorithm
1113:Category
1094:Category
1000:Kademlia
960:Codetext
903:(CSPRNG)
470:Hardware
439:Software
410:Crypto-1
135:Security
116:351 bit
113:297 bit
94:128 bit
83:128 bit
770:General
698:Attacks
487:Trivium
456:Salsa20
430:eSTREAM
91:80 bit
80:80 bit
36:eSTREAM
881:Keygen
657:Theory
607:Turing
602:Spritz
577:Scream
547:Phelix
542:Panama
512:F-FCSR
482:MICKEY
451:Rabbit
446:HC-128
405:ChaCha
289:
238:
208:
145:packet
50:means
40:eCRYPT
911:(PRN)
679:NLFSR
592:SOBER
522:ISAAC
477:Grain
311:(PDF)
283:(PDF)
232:(PDF)
202:(PDF)
182:(PDF)
125:NLFSR
674:LFSR
622:WAKE
617:VMPC
612:VEST
587:SNOW
582:SEAL
572:RC4A
567:RC4+
562:QUAD
552:Pike
537:ORYX
532:MUGI
517:FISH
400:A5/2
395:A5/1
287:ISBN
236:ISBN
206:ISBN
158:CMOS
129:LFSR
420:RC4
131:).
19:In
1115::
689:IV
557:Py
415:E0
313:.
105:2
102:2
23:,
755:e
748:t
741:v
373:e
366:t
359:v
317:.
295:.
244:.
214:.
123:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.