Knowledge (XXG)

Achterbahn (stream cipher)

Source 📝

1090: 122:
ACHTERBAHN-128 is downward compatible and can produce the same keystream as ACHTERBAHN-80 if so desired. The keystream generator of ACHTERBAHN-128/80 is based on the design principle of the nonlinear combination generator, however it deploys primitive nonlinear feedback shift registers
155:
The ACHTERBAHN-128/80 stream cipher is optimized for hardware applications with restricted resources, such as limited gate count and power consumption. An implementation of ACHTERBAHN-80 has a design size of only 2188 gate equivalents (Nand-GE) in a standard
160:
technology and delivers a throughput of up to 400 Megabit/s. This makes it suitable for RFID tags. A high-speed implementation with a throughput of 8 Gigabit/s has a design size of 8651 Nand-GE.
234:. Research in Cryptology: Second Western European Workshop, WEWoRC. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4945. Bochum, Germany: Springer. pp. 142–152. 1070: 900: 204:. Fast Software Encryption, 14th International Workshop. Revised Selected Papers, Lecture Notes in Computer Science. Vol. 4593. Luxembourg: Springer. pp. 73–86. 147:) lengths are used in a communication protocol. The cipher's authors recommend a maximum frame length of 2 bits. This value does however not imply practical limitations. 337:
M.I. Mahmoud et.al.: Wavelet Data Hiding using Achterbahn-128 on FPGA Technology, UbiCC Journal - Special Issue of IKE'07 Conference, IKE'07 - Special Issue, 1/15/2008
753: 371: 46:, because it supports the key lengths of 80 bits and 128 bits, respectively. Achterbahn was developed by Berndt Gammel, Rainer Göttfert and Oliver Kniffler. 616: 290: 239: 209: 285:. Proceedings of the 2007 IEEE Information Theory Workshop on Information Theory for Wireless Networks. Solstrand, Norway. pp. 91–95. 277: 261:. Workshop Record of The State of the Art of Stream Ciphers - SASC. Ruhr University Bochum, Germany. pp. 152–165. Archived from 746: 678: 364: 256: 144: 949: 673: 663: 739: 357: 1065: 1020: 833: 139:
There are no known cryptanalytic attacks against ACHTERBAHN-128/80 for the tabulated parameters that are faster than
944: 647: 307: 1060: 1050: 1040: 895: 642: 1118: 1045: 1035: 838: 798: 791: 781: 776: 786: 178: 1093: 939: 885: 714: 688: 541: 1055: 979: 709: 276:
Göttfert, Rainer; Gammel, Berndt M. (July 1–6, 2007). Helleseth, T.; Kumar, V.; Ytrehus, Ø. (eds.).
818: 637: 924: 908: 855: 704: 140: 984: 974: 845: 286: 235: 205: 919: 486: 606: 601: 576: 450: 226: 196: 994: 914: 875: 823: 808: 668: 521: 476: 262: 1112: 1075: 1030: 989: 969: 865: 828: 803: 621: 581: 561: 551: 516: 380: 28: 1025: 870: 860: 850: 813: 762: 20: 1004: 556: 414: 964: 934: 929: 890: 683: 331: 255:
Gammel, Berndt M.; Göttfert, Rainer; Kniffler, Oliver (Jan 31 – Feb 1, 2007).
58:, which indicates that the cipher can encrypt eight bit streams in parallel. 954: 596: 526: 460: 31: 336: 999: 959: 409: 455: 429: 404: 35: 306:
Gammel, Berndt M.; Göttfert, Rainer; Kniffler, Oliver (30 June 2006).
177:
Gammel, Berndt M.; Göttfert, Rainer; Kniffler, Oliver (30 June 2006).
880: 546: 511: 481: 445: 143:. Recent analysis showed that attacks are possible if larger frame ( 39: 591: 228:
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
124: 611: 586: 536: 531: 399: 394: 157: 128: 735: 353: 61:
The parameters of the cipher are given in the following table:
54:(in German), though a literal translation of the term would be 571: 566: 419: 42:
network. In the final specification the cipher is called
901:
Cryptographically secure pseudorandom number generator
341: 1013: 769: 697: 656: 630: 499: 469: 438: 428: 387: 747: 365: 8: 195:Naya-Plasencia, María (March 26–28, 2007). 754: 740: 732: 435: 372: 358: 350: 346: 342: 279:On the frame length of Achterbahn-128/80 225:Naya-Plasencia, María (July 4–6, 2007). 63: 169: 258:Achterbahn-128/80: Design and Analysis 184:. ECRYPT Stream Cipher Project Report. 7: 198:Cryptanalysis of Achterbahn-128/80 14: 1089: 1088: 950:Information-theoretic security 1: 27:is the name of a synchronous 664:block ciphers in stream mode 315:The Achterbahn Stream Cipher 1066:Message authentication code 1021:Cryptographic hash function 834:Cryptographic hash function 109: 98: 87: 76: 66: 1135: 945:Harvest now, decrypt later 648:alternating step generator 127:) instead of linear ones ( 1084: 1061:Post-quantum cryptography 731: 349: 345: 1051:Quantum key distribution 1041:Authenticated encryption 896:Random number generation 643:self-shrinking generator 1046:Public-key cryptography 1036:Symmetric-key algorithm 839:Key derivation function 799:Cryptographic primitive 792:Authentication protocol 782:Outline of cryptography 777:History of cryptography 787:Cryptographic protocol 940:End-to-end encryption 886:Cryptojacking malware 715:stream cipher attacks 1056:Quantum cryptography 980:Trusted timestamping 710:correlation immunity 332:Achterbahn home page 819:Cryptographic nonce 638:shrinking generator 388:Widely used ciphers 308:"ACHTERBAHN-128/80" 179:"ACHTERBAHN-128/80" 925:Subliminal channel 909:Pseudorandom noise 856:Key (cryptography) 705:correlation attack 141:brute force attack 99:Max. frame length 1106: 1105: 1102: 1101: 985:Key-based routing 975:Trapdoor function 846:Digital signature 727: 726: 723: 722: 495: 494: 292:978-1-4244-1199-3 265:on July 24, 2007. 241:978-3-540-88352-4 211:978-3-540-74617-1 120: 119: 44:ACHTERBAHN-128/80 34:submitted to the 1126: 1092: 1091: 920:Insecure channel 756: 749: 742: 733: 436: 374: 367: 360: 351: 347: 343: 319: 318: 312: 303: 297: 296: 284: 273: 267: 266: 252: 246: 245: 233: 222: 216: 215: 203: 192: 186: 185: 183: 174: 77:Max. key length 64: 1134: 1133: 1129: 1128: 1127: 1125: 1124: 1123: 1109: 1108: 1107: 1098: 1080: 1009: 765: 760: 719: 693: 652: 626: 491: 465: 424: 383: 378: 328: 323: 322: 310: 305: 304: 300: 293: 282: 275: 274: 270: 254: 253: 249: 242: 231: 224: 223: 219: 212: 201: 194: 193: 189: 181: 176: 175: 171: 166: 153: 137: 110:Internal state 88:Max. IV length 72:ACHTERBAHN-128 38:Project of the 17: 12: 11: 5: 1132: 1130: 1122: 1121: 1119:Stream ciphers 1111: 1110: 1104: 1103: 1100: 1099: 1097: 1096: 1085: 1082: 1081: 1079: 1078: 1073: 1071:Random numbers 1068: 1063: 1058: 1053: 1048: 1043: 1038: 1033: 1028: 1023: 1017: 1015: 1011: 1010: 1008: 1007: 1002: 997: 995:Garlic routing 992: 987: 982: 977: 972: 967: 962: 957: 952: 947: 942: 937: 932: 927: 922: 917: 915:Secure channel 912: 906: 905: 904: 893: 888: 883: 878: 876:Key stretching 873: 868: 863: 858: 853: 848: 843: 842: 841: 836: 826: 824:Cryptovirology 821: 816: 811: 809:Cryptocurrency 806: 801: 796: 795: 794: 784: 779: 773: 771: 767: 766: 761: 759: 758: 751: 744: 736: 729: 728: 725: 724: 721: 720: 718: 717: 712: 707: 701: 699: 695: 694: 692: 691: 686: 681: 676: 671: 669:shift register 666: 660: 658: 654: 653: 651: 650: 645: 640: 634: 632: 628: 627: 625: 624: 619: 614: 609: 604: 599: 594: 589: 584: 579: 574: 569: 564: 559: 554: 549: 544: 539: 534: 529: 524: 519: 514: 509: 503: 501: 497: 496: 493: 492: 490: 489: 484: 479: 473: 471: 467: 466: 464: 463: 458: 453: 448: 442: 440: 433: 426: 425: 423: 422: 417: 412: 407: 402: 397: 391: 389: 385: 384: 381:Stream ciphers 379: 377: 376: 369: 362: 354: 340: 339: 334: 327: 326:External links 324: 321: 320: 298: 291: 268: 247: 240: 217: 210: 187: 168: 167: 165: 162: 152: 149: 136: 133: 118: 117: 114: 111: 107: 106: 103: 100: 96: 95: 92: 89: 85: 84: 81: 78: 74: 73: 70: 69:ACHTERBAHN-80 67: 15: 13: 10: 9: 6: 4: 3: 2: 1131: 1120: 1117: 1116: 1114: 1095: 1087: 1086: 1083: 1077: 1076:Steganography 1074: 1072: 1069: 1067: 1064: 1062: 1059: 1057: 1054: 1052: 1049: 1047: 1044: 1042: 1039: 1037: 1034: 1032: 1031:Stream cipher 1029: 1027: 1024: 1022: 1019: 1018: 1016: 1012: 1006: 1003: 1001: 998: 996: 993: 991: 990:Onion routing 988: 986: 983: 981: 978: 976: 973: 971: 970:Shared secret 968: 966: 963: 961: 958: 956: 953: 951: 948: 946: 943: 941: 938: 936: 933: 931: 928: 926: 923: 921: 918: 916: 913: 910: 907: 902: 899: 898: 897: 894: 892: 889: 887: 884: 882: 879: 877: 874: 872: 869: 867: 866:Key generator 864: 862: 859: 857: 854: 852: 849: 847: 844: 840: 837: 835: 832: 831: 830: 829:Hash function 827: 825: 822: 820: 817: 815: 812: 810: 807: 805: 804:Cryptanalysis 802: 800: 797: 793: 790: 789: 788: 785: 783: 780: 778: 775: 774: 772: 768: 764: 757: 752: 750: 745: 743: 738: 737: 734: 730: 716: 713: 711: 708: 706: 703: 702: 700: 696: 690: 687: 685: 682: 680: 677: 675: 672: 670: 667: 665: 662: 661: 659: 655: 649: 646: 644: 641: 639: 636: 635: 633: 629: 623: 620: 618: 615: 613: 610: 608: 605: 603: 600: 598: 595: 593: 590: 588: 585: 583: 580: 578: 575: 573: 570: 568: 565: 563: 560: 558: 555: 553: 550: 548: 545: 543: 540: 538: 535: 533: 530: 528: 525: 523: 520: 518: 515: 513: 510: 508: 505: 504: 502: 500:Other ciphers 498: 488: 485: 483: 480: 478: 475: 474: 472: 468: 462: 459: 457: 454: 452: 449: 447: 444: 443: 441: 437: 434: 431: 427: 421: 418: 416: 413: 411: 408: 406: 403: 401: 398: 396: 393: 392: 390: 386: 382: 375: 370: 368: 363: 361: 356: 355: 352: 348: 344: 338: 335: 333: 330: 329: 325: 316: 309: 302: 299: 294: 288: 281: 280: 272: 269: 264: 260: 259: 251: 248: 243: 237: 230: 229: 221: 218: 213: 207: 200: 199: 191: 188: 180: 173: 170: 163: 161: 159: 150: 148: 146: 142: 134: 132: 130: 126: 115: 112: 108: 104: 101: 97: 93: 90: 86: 82: 79: 75: 71: 68: 65: 62: 59: 57: 53: 52:rollercoaster 49: 45: 41: 37: 33: 30: 29:stream cipher 26: 22: 16:Stream cipher 1026:Block cipher 871:Key schedule 861:Key exchange 851:Kleptography 814:Cryptosystem 763:Cryptography 506: 314: 301: 278: 271: 263:the original 257: 250: 227: 220: 197: 190: 172: 154: 138: 121: 60: 55: 51: 47: 43: 24: 21:cryptography 18: 1014:Mathematics 1005:Mix network 151:Performance 56:eight-track 965:Ciphertext 935:Decryption 930:Encryption 891:Ransomware 684:T-function 631:Generators 507:Achterbahn 164:References 48:Achterbahn 25:Achterbahn 955:Plaintext 597:SOBER-128 527:KCipher-2 461:SOSEMANUK 432:Portfolio 32:algorithm 1113:Category 1094:Category 1000:Kademlia 960:Codetext 903:(CSPRNG) 470:Hardware 439:Software 410:Crypto-1 135:Security 116:351 bit 113:297 bit 94:128 bit 83:128 bit 770:General 698:Attacks 487:Trivium 456:Salsa20 430:eSTREAM 91:80 bit 80:80 bit 36:eSTREAM 881:Keygen 657:Theory 607:Turing 602:Spritz 577:Scream 547:Phelix 542:Panama 512:F-FCSR 482:MICKEY 451:Rabbit 446:HC-128 405:ChaCha 289:  238:  208:  145:packet 50:means 40:eCRYPT 911:(PRN) 679:NLFSR 592:SOBER 522:ISAAC 477:Grain 311:(PDF) 283:(PDF) 232:(PDF) 202:(PDF) 182:(PDF) 125:NLFSR 674:LFSR 622:WAKE 617:VMPC 612:VEST 587:SNOW 582:SEAL 572:RC4A 567:RC4+ 562:QUAD 552:Pike 537:ORYX 532:MUGI 517:FISH 400:A5/2 395:A5/1 287:ISBN 236:ISBN 206:ISBN 158:CMOS 129:LFSR 420:RC4 131:). 19:In 1115:: 689:IV 557:Py 415:E0 313:. 105:2 102:2 23:, 755:e 748:t 741:v 373:e 366:t 359:v 317:. 295:. 244:. 214:. 123:(

Index

cryptography
stream cipher
algorithm
eSTREAM
eCRYPT
NLFSR
LFSR
brute force attack
packet
CMOS
"ACHTERBAHN-128/80"
Cryptanalysis of Achterbahn-128/80
ISBN
978-3-540-74617-1
Cryptanalysis of Achterbahn-128/80 with a New Keystream Limitation
ISBN
978-3-540-88352-4
Achterbahn-128/80: Design and Analysis
the original
On the frame length of Achterbahn-128/80
ISBN
978-1-4244-1199-3
"ACHTERBAHN-128/80"
Achterbahn home page
M.I. Mahmoud et.al.: Wavelet Data Hiding using Achterbahn-128 on FPGA Technology, UbiCC Journal - Special Issue of IKE'07 Conference, IKE'07 - Special Issue, 1/15/2008
v
t
e
Stream ciphers
A5/1

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.