SI
SI
discoversearch

We've detected that you're using an ad content blocking browser plug-in or feature. Ads provide a critical source of revenue to the continued operation of Silicon Investor.  We ask that you disable ad blocking while on Silicon Investor in the best interests of our community.  If you are not using an ad blocker but are still receiving this message, make sure your browser's tracking protection is set to the 'standard' level.
Technology Stocks : Security Technologies - Straight Talk -- Ignore unavailable to you. Want to Upgrade?


To: caly who wrote (131)6/29/1999 1:50:00 PM
From: caly  Read Replies (1) | Respond to of 206
 
AES Info and Update...

The NIST Advanced Encryption Standard (AES) initiative was put in place to find a replacement algorithm for DES which is quickly approaching the end of its useful life. NIST has coined AES as “The Crypto Algorithm for the 21st Century.”

The process for selecting the AES algorithm(s) will be largely based on public involvement in addition to NIST evaluation. NIST called for candidate algorithms from the public and received 21 algorithms in response. Six of the received packages were incomplete and thus disqualified, leaving 15 algorithms as contenders. Five of these 15 algorithms were submitted by U.S. companies or cryptographers while the other ten were international.

The goals of the AES algorithm have been stated by NIST to be the following:

 Symmetric, block cipher with variable key size (128, 192, 256), and large (128-bit) block size.
 More secure and efficient than TripleDES.
 Royalty-free worldwide.
 Security >30 years.
 Public confidence in AES algorithm, based on involvement in submission and analysis efforts.

The algorithms will be judged based on the following:

 Security
 Cost (royalty-free, computational efficiency, memory requirements)
 Algorithm and Implementation Characteristics ( Flexibility e.g. additional block sizes, variety of platforms, stream cipher, MAC generator, pseudo-random number generator, hashing algorithm, etc…; Hardware and Software Suitability; Simplicity)

Timeline of Activities

09/12/1998 NIST issues a call for algorithms for AES

08/20/1998 NIST announces the 15 candidate algorithms at the First AES Candidate Conference and opens the Round 1 Comment Period

03/22/1999 Second AES Candidate Conference held. Round 1 technical analysis discussed

04/15/1999 Official end of Round 1 Comment Period

05/15/1999 Deadline for algorithm “Tweak” proposals

Summer 1999 Announcement of finalist algorithms and Round 2 Comment Period opens

04/10/2000 Third AES Candidate Conference to be held

05/15/2000 Round 2 Comment Period closes

August 2000 Announcement of AES winner(s)

Original 15 Algorithms Announced on August 20, 1998

Algorithm - Submitter Name(s)

CAST-256 - Entrust Technologies, Inc. (represented by Carlisle Adams)
CRYPTON - Future Systems, Inc. (represented by Chae Hoon Lim)
DEAL - Richard Outerbridge, Lars Knudsen
DFC - Centre National pour la Recherche Scientifique (represented by Serge Vaudenay)
E2 - Nippon Telegraph and Telephone Corporation (represented by Masayuki Kanda)
FROG - TecApro Internacional S.A. (represented by Dianelos Georgoudis)
HPC - Rich Schroeppel
LOKI97 - Lawrie Brown, Josef Pieprzyk, Jennifer Seberry
MAGENTA - Deutsche Telekom AG (represented by Dr. Klaus Huber)
MARS - IBM (represented by Nevenko Zunic)
RC6 - RSA Laboratories (represented by Matthew Robshaw)
RIJNDAEL - Joan Daemen, Vincent Rijmen
SAFER+ - Cylink Corporation (represented by Charles Williams)
SERPENT - Ross Anderson, Eli Biham, Lars Knudsen
TWOFISH - Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall, Niels Ferguson

Unofficial “Rankings” of Candidate Algorithms Based on AES2 Anonymous Ballot

Algorithm

1. RIJNDAEL
2. RC6
3. TWOFISH
4. MARS
5. SERPENT
6. E2
7. CAST-256
8. SAFER+
9. DFC
10. CRYPTON
11. DEAL
12. HPC
13. MAGENTA
14. FROG
14. LOKI97

Crytpanalytic attacks on FROG, DEAL, MAGENTA and LOKI97 have already been well documented.