Paper 2009/029
Nofish - A new stream cipher
Marius Oliver Gheorghita
Abstract
The proposed algorithm is a synchronous stream cipher, more precisely a binary additive stream cipher because it using the XOR function to encrypt the plaintext. The design is based on HENKOS stream cipher (http://eprint.iacr.org/2004/080.pdf), the functions used in the internal state are kept, the initialization and mixing key part being modified with respect to its revealed weaknesses. This stream cipher uses a named key of 64 bytes (512 bits) as a secret key and no initialization vector. Nofish is free to use for any non-commercial purposes, and the reference source code can be found in the appendix.
Note: Some changes were made in the key mixing in order to avoid weak keys.
Metadata
- Available format(s)
- Publication info
- Published elsewhere. Unknown where it was published
- Keywords
- secret-key cryptographypseudo-randomnessstream ciphers
- Contact author(s)
- redwire05 @ yahoo com
- History
- 2009-05-18: last of 5 revisions
- 2009-01-17: received
- See all versions
- Short URL
- https://ia.cr/2009/029
- License
-
CC BY
BibTeX
@misc{cryptoeprint:2009/029, author = {Marius Oliver Gheorghita}, title = {Nofish - A new stream cipher}, howpublished = {Cryptology {ePrint} Archive, Paper 2009/029}, year = {2009}, url = {https://eprint.iacr.org/2009/029} }