Rabbit: A New High-Performance Stream Cipher

  • Martin Boesgaard
  • Mette Vesterager
  • Thomas Pedersen
  • Jesper Christiansen
  • Ove Scavenius
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2887)


We present a new stream cipher, Rabbit, based on iterating a set of coupled non-linear functions. Rabbit is characterized by a high performance in software with a measured encryption/decryption speed of 3.7 clock cycles per byte on a Pentium III processor. We have performed detailed security analysis, in particular, correlation analysis and algebraic investigations. The cryptanalysis of Rabbit did not reveal an attack better than exhaustive key search.


Stream cipher fast non-linear coupled counter chaos 


  1. 1.
    Wolfram, S.: Cryptography with Cellular Automata. In: Williams, H.C. (ed.) CRYPTO 1985. LNCS, vol. 218, pp. 429–432. Springer, Heidelberg (1986)Google Scholar
  2. 2.
    Jakimoski, G., Kocarev, L.: Chaos and Cryptography: Block Encryption Ciphers Based on Chaotic Maps. IEEE Transactions on Circuits and Systems-1: Fundamental Theory and Applications 48(2), 163–169 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  3. 3.
    Habutso, T., Nishio, Y., Sasase, I., Mori, S.: A secret key cryptosystem by iterating a chaotic map. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 127–140. Springer, Heidelberg (1991)Google Scholar
  4. 4.
    Biham, E.: Cryptoanalysis of the chaotic-map cryptosystem suggested at EUROCRYPT 1991. In: Davies, D.W. (ed.) EUROCRYPT 1991. LNCS, vol. 547, pp. 532–534. Springer, Heidelberg (1991)Google Scholar
  5. 5.
    Matthews, R.: On the Derivation of a “Chaotic” Encryption Algorithm. Cryptology XIII(1), 29–41 (1989)CrossRefMathSciNetGoogle Scholar
  6. 6.
    Yates, R.: Fixed-Point Arithmetic: An Introduction,
  7. 7.
    Menezes, A., Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press LLC, Boca Raton (1997)zbMATHGoogle Scholar
  8. 8.
    Shamir, A., Tsaban, B.: Guaranteeing the Diversity of Number Generators. Information and Computation 171(2), 350–363 (2001)zbMATHCrossRefMathSciNetGoogle Scholar
  9. 9.
    Matsui, M.: Linear Cryptanalysis Method for DES Cipher. In: Helleseth, T. (ed.) EUROCRYPT 1993. LNCS, vol. 765, pp. 386–397. Springer, Heidelberg (1994)Google Scholar
  10. 10.
    Rueppel, R.A.: Analysis and Design of Stream Ciphers. Springer, Berlin (1986)zbMATHGoogle Scholar
  11. 11.
    Daemen, J.: ch. 5: Propagation and Correlation. Annex to AES Proposal (1998)Google Scholar
  12. 12.
    A Statistical Test Suite for the Validation of Random Number Generators and Pseudo Random Number Generators for Cryptographic Applications, NIST Special Publication 800-22, National Institute of Standards and Technology (2001),
  13. 13.
    Masaglia, G.: A battery of tests for random number generators, Florida State University,
  14. 14.
    Walker, J.: A Pseudorandom Number Sequence Test Program,
  15. 15.
    Meier, W., Staffelbach, O.: Fast Correlation Attacks on Stream Ciphers. In: Günther, C.G. (ed.) EUROCRYPT 1988. LNCS, vol. 330, pp. 301–314. Springer, Heidelberg (1988)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Martin Boesgaard
    • 1
  • Mette Vesterager
    • 1
  • Thomas Pedersen
    • 1
  • Jesper Christiansen
    • 1
  • Ove Scavenius
    • 1
  1. 1.CRYPTICO A/SCopenhagenDenmark

Personalised recommendations