Paper 2009/029

Nofish - A new stream cipher

Marius Oliver Gheorghita


The proposed algorithm is a synchronous stream cipher, more precisely a binary additive stream cipher because it using the XOR function to encrypt the plaintext. The design is based on HENKOS stream cipher (, the functions used in the internal state are kept, the initialization and mixing key part being modified with respect to its revealed weaknesses. This stream cipher uses a named key of 64 bytes (512 bits) as a secret key and no initialization vector. Nofish is free to use for any non-commercial purposes, and the reference source code can be found in the appendix.

Note: Some changes were made in the key mixing in order to avoid weak keys.

Available format(s)
Publication info
Published elsewhere. Unknown where it was published
secret-key cryptographypseudo-randomnessstream ciphers
Contact author(s)
redwire05 @ yahoo com
2009-05-18: last of 5 revisions
2009-01-17: received
See all versions
Short URL
Creative Commons Attribution


      author = {Marius Oliver Gheorghita},
      title = {Nofish - A new stream cipher},
      howpublished = {Cryptology ePrint Archive, Paper 2009/029},
      year = {2009},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.