The Stream Cipher Edon80

  • Danilo Gligoroski
  • Smile Markovski
  • Svein Johan Knapskog
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4986)


Edon80 is a hardware binary additive synchronous stream cipher. It’s properties are: 1.) The internal structure is highly pipelined; 2.) It is highly parallelizable, making it scalable from the speed of processing point of view; 3.) Its design principles offer possibilities to achieve significant speed asymmetry — it belongs to a family of stream ciphers that in hardware can have a constant speed of one bit per clock cycle, but in software implementation on popular modern CPUs can be made as slow as needed. Since its first description in 2005, it has been analyzed by several cryptographers, have been implemented in a more compact way and a MAC functionality have been added. We give a full description of Edon80 including latest developments and updates.


hardware synchronous stream cipher Latin square quasigroup quasigroup string transformations 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    eSTREAM: ECRYPT Stream Cipher Project,
  2. 2.
    Gligoroski, D., Markovski, S., Kocarev, L., Gusev, M.: Edon80, eSTREAM [1], Report 2005/007 (2005)Google Scholar
  3. 3.
    Hong, J.: Remarks on the Period of Edon80, eSTREAM [1], Report 2005/041 (June 18, 2005)Google Scholar
  4. 4.
    Hong, J.: Period of Stream Cipher Edon80. In: Maitra, S., Veni Madhavan, C.E., Venkatesan, R. (eds.) INDOCRYPT 2005. LNCS, vol. 3797, pp. 23–34. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  5. 5.
    Gligoroski, D., Markovski, S., Kocarev, L., Gusev, M.: Understanding periods in Edon80, eSTREAM [1], Report 2005/054 (2005)Google Scholar
  6. 6.
    Gligoroski, D., Markovski, S., Knapskog, S.J.: On periods of Edon-(2m, 2k) family of stream ciphers. In: State of the Art of Stream Ciphers, Workshop Record, SASC 2006, Leuven, Belgium (2006)Google Scholar
  7. 7.
    Gligoroski, D., Markovski, S., Kocarev, L., Gusev, M.: Status of Edon80 in the second phase of eSTREAM, eSTREAM [1] (2006),
  8. 8.
    Vojvoda, M., Sýs, M., Jókay, M.: A note on algebraic properties of quasigroups in Edon80, eSTREAM [1], Report 2007/032 (2007)Google Scholar
  9. 9.
    Bjørstad, T.E.: A note on the Edon80 S-box, eSTREAM [1], Report 2007/043 (2007)Google Scholar
  10. 10.
    Johansson, T., Hell, M.: A Key Recovery Attack on Edon80. In: Kurosawa, K. (ed.) ASIACRYPT 2007. LNCS, vol. 4833, pp. 568–581. Springer, Heidelberg (in print, 2007)Google Scholar
  11. 11.
    Kasper, M., Kumar, S., Lemke-Rust, K., Paar, C.: A Compact Implementation of Edon80, eSTREAM [1], Report 2006/057 (2006)Google Scholar
  12. 12.
    Gligoroski, D., Knapskog, S.J.: Adding MAC functionality to Edon80, Report 2007/031, [1] (2007)Google Scholar
  13. 13.
    Menezes, A., van Oorschot, P., Vanstone, S.: Handbook of Applied Cryptography. CRC Press, Inc., Boca Raton (1997)zbMATHGoogle Scholar
  14. 14.
    Dénes, J., Keedwell, A.D.: Latin Squares and their Applications. English Univer. Press Ltd. (1974)Google Scholar
  15. 15.
    Markovski, S., Gligoroski, D., Bakeva, V.: Quasigroup String Processing: Part 1. Maced. Acad. of Sci. and Arts, Sc. Math. Tech. Scien. XX 1-2, 13–28 (1999)MathSciNetGoogle Scholar
  16. 16.
    eSTREAM Pase 3, Software Performance Figures,

Copyright information

© Springer-Verlag Berlin Heidelberg 2008

Authors and Affiliations

  • Danilo Gligoroski
    • 1
  • Smile Markovski
    • 2
  • Svein Johan Knapskog
    • 1
  1. 1.Centre for Quantifiable Quality of Service in Communication SystemsNorwegian University of Science and TechnologyTrondheimNorway
  2. 2.Faculty of Natural Sciences and Mathematics, Institute of Informatics“Ss Cyril and Methodius” UniversitySkopjeMacedonia

Personalised recommendations