Paper 2009/029

Nofish - A new stream cipher

Marius Oliver Gheorghita

Abstract

The proposed algorithm is a synchronous stream cipher, more precisely a binary additive stream cipher because it using the XOR function to encrypt the plaintext. The design is based on HENKOS stream cipher (http://eprint.iacr.org/2004/080.pdf), the functions used in the internal state are kept, the initialization and mixing key part being modified with respect to its revealed weaknesses. This stream cipher uses a named key of 64 bytes (512 bits) as a secret key and no initialization vector. Nofish is free to use for any non-commercial purposes, and the reference source code can be found in the appendix.

Note: Some changes were made in the key mixing in order to avoid weak keys.

Metadata
Available format(s)
PDF
Publication info
Published elsewhere. Unknown where it was published
Keywords
secret-key cryptographypseudo-randomnessstream ciphers
Contact author(s)
redwire05 @ yahoo com
History
2009-05-18: last of 5 revisions
2009-01-17: received
See all versions
Short URL
https://ia.cr/2009/029
License
Creative Commons Attribution
CC BY

BibTeX

@misc{cryptoeprint:2009/029,
      author = {Marius Oliver Gheorghita},
      title = {Nofish - A new stream cipher},
      howpublished = {Cryptology {ePrint} Archive, Paper 2009/029},
      year = {2009},
      url = {https://eprint.iacr.org/2009/029}
}
Note: In order to protect the privacy of readers, eprint.iacr.org does not use cookies or embedded third party content.