HC-256
E845873
HC-256 is a high-speed stream cipher designed for software efficiency and strong security, selected as one of the eSTREAM project’s recommended algorithms.
Statements (47)
| Predicate | Object |
|---|---|
| instanceOf |
software-oriented cipher
ⓘ
stream cipher ⓘ symmetric-key algorithm ⓘ |
| belongsTo | eSTREAM portfolio ⓘ |
| categoryInESTREAM | software profile ⓘ |
| cipherType | synchronous stream cipher ⓘ |
| competesWith |
Grain
ⓘ
Rabbit ⓘ Salsa20 NERFINISHED ⓘ Trivium NERFINISHED ⓘ |
| designedFor |
high-speed software encryption
ⓘ
strong security ⓘ |
| designer | Hongjun Wu NERFINISHED ⓘ |
| designGoal | simple operations for efficient software implementation ⓘ |
| designPeriod | eSTREAM era ⓘ |
| encryptionMode | XOR keystream with plaintext ⓘ |
| encryptionModel | keystream generator plus XOR ⓘ |
| fieldOfUse |
applied cryptography
ⓘ
information security ⓘ |
| implementationFocus | software on general-purpose CPUs ⓘ |
| IVSize | 256 bits ⓘ |
| keyReuseRequirement | IV must not repeat with same key ⓘ |
| keySetup | expands key and IV into internal state ⓘ |
| keySize | 256 bits ⓘ |
| operationDomain | binary data ⓘ |
| outputGeneration | nonlinear combination of table entries ⓘ |
| outputType | keystream bits ⓘ |
| performanceCharacteristic | high throughput in software ⓘ |
| periodProperty | very large internal state space ⓘ |
| primaryApplication |
high-throughput environments
ⓘ
software encryption ⓘ |
| project | eCRYPT eSTREAM NERFINISHED ⓘ |
| securityAssumption | hardness of distinguishing keystream from random ⓘ |
| securityGoal |
long period keystream
ⓘ
resistance to known cryptanalytic attacks ⓘ |
| selectedIn | eSTREAM project NERFINISHED ⓘ |
| standardizationStatus | eSTREAM recommended but not an ISO standard ⓘ |
| stateSize | large internal state ⓘ |
| statusInESTREAM | recommended cipher ⓘ |
| supportsIVLength | 256-bit IV GENERATED ⓘ |
| supportsKeyLength | 256-bit key ⓘ |
| usesOperation |
32-bit word operations
ⓘ
bitwise XOR ⓘ bitwise shifts and rotations ⓘ modular addition ⓘ |
| usesStructure |
pseudorandom table updates
ⓘ
two large internal tables ⓘ |
Referenced by (1)
Full triples — surface form annotated when it differs from this entity's canonical label.