To: caly who wrote (131 ) 6/29/1999 1:50:00 PM From: caly Read Replies (1) | Respond to of 206
AES Info and Update... The NIST Advanced Encryption Standard (AES) initiative was put in place to find a replacement algorithm for DES which is quickly approaching the end of its useful life. NIST has coined AES as “The Crypto Algorithm for the 21st Century.” The process for selecting the AES algorithm(s) will be largely based on public involvement in addition to NIST evaluation. NIST called for candidate algorithms from the public and received 21 algorithms in response. Six of the received packages were incomplete and thus disqualified, leaving 15 algorithms as contenders. Five of these 15 algorithms were submitted by U.S. companies or cryptographers while the other ten were international. The goals of the AES algorithm have been stated by NIST to be the following:  Symmetric, block cipher with variable key size (128, 192, 256), and large (128-bit) block size.  More secure and efficient than TripleDES.  Royalty-free worldwide.  Security >30 years.  Public confidence in AES algorithm, based on involvement in submission and analysis efforts. The algorithms will be judged based on the following:  Security  Cost (royalty-free, computational efficiency, memory requirements)  Algorithm and Implementation Characteristics ( Flexibility e.g. additional block sizes, variety of platforms, stream cipher, MAC generator, pseudo-random number generator, hashing algorithm, etc…; Hardware and Software Suitability; Simplicity)Timeline of Activities 09/12/1998 NIST issues a call for algorithms for AES 08/20/1998 NIST announces the 15 candidate algorithms at the First AES Candidate Conference and opens the Round 1 Comment Period 03/22/1999 Second AES Candidate Conference held. Round 1 technical analysis discussed 04/15/1999 Official end of Round 1 Comment Period 05/15/1999 Deadline for algorithm “Tweak” proposals Summer 1999 Announcement of finalist algorithms and Round 2 Comment Period opens 04/10/2000 Third AES Candidate Conference to be held 05/15/2000 Round 2 Comment Period closes August 2000 Announcement of AES winner(s)Original 15 Algorithms Announced on August 20, 1998 Algorithm - Submitter Name(s) CAST-256 - Entrust Technologies, Inc. (represented by Carlisle Adams) CRYPTON - Future Systems, Inc. (represented by Chae Hoon Lim) DEAL - Richard Outerbridge, Lars Knudsen DFC - Centre National pour la Recherche Scientifique (represented by Serge Vaudenay) E2 - Nippon Telegraph and Telephone Corporation (represented by Masayuki Kanda) FROG - TecApro Internacional S.A. (represented by Dianelos Georgoudis) HPC - Rich Schroeppel LOKI97 - Lawrie Brown, Josef Pieprzyk, Jennifer Seberry MAGENTA - Deutsche Telekom AG (represented by Dr. Klaus Huber) MARS - IBM (represented by Nevenko Zunic) RC6 - RSA Laboratories (represented by Matthew Robshaw) RIJNDAEL - Joan Daemen, Vincent Rijmen SAFER+ - Cylink Corporation (represented by Charles Williams) SERPENT - Ross Anderson, Eli Biham, Lars Knudsen TWOFISH - Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson Unofficial “Rankings” of Candidate Algorithms Based on AES2 Anonymous Ballot Algorithm 1. RIJNDAEL 2. RC6 3. TWOFISH 4. MARS 5. SERPENT 6. E2 7. CAST-256 8. SAFER+ 9. DFC 10. CRYPTON 11. DEAL 12. HPC 13. MAGENTA 14. FROG 14. LOKI97 Crytpanalytic attacks on FROG, DEAL, MAGENTA and LOKI97 have already been well documented.