AES competition/Catalogs/AES players: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
No edit summary
imported>Sandy Harris
No edit summary
Line 9: Line 9:


At least two writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis, [[Carlisle Adams]] in [[Block_cipher#CAST|CAST]] and [[Serge Vaudenay]] with his [[decorrelation theory]].
At least two writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis, [[Carlisle Adams]] in [[Block_cipher#CAST|CAST]] and [[Serge Vaudenay]] with his [[decorrelation theory]].
Standard references in the field include [[Bruce Schneier]]'s ''Applied Cryptography''
<ref name="schneier">{{citation
| first = Bruce | last = Schneier
| title = Applied Cryptography
| date = 2nd edition, 1996,
| publisher = John Wiley & Sons
|ISBN =0-471-11709-9}}</ref>
and [[Ross Anderson]]'s ''Security Engineering'' <ref>{{cite book|author=Ross Anderson|title=Security Engineering|url=http://www.cl.cam.ac.uk/~rja14/book.html}}</ref>.


Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.
Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.
Line 40: Line 49:
</table>
</table>


Quite a few of these people are also well-known for breaking various ciphers. Perhaps the best-publicised break was [[David Wagner]] and [[Ian Goldberg]] cracking [[Netscape]]'s [[SSL]] via flaws in the [[random number]] generator. [[Ross Anderson]] or his students break almost every [[smartcard]] that comes on the market. Knudsen, Biham, Schneier and Kelsey have all published many papers on [[cryptanalysis]] of various ciphers. Some of the others have various breaks to their credit as well.
Quite a few of these people are also well-known for breaking various ciphers. Perhaps the best-publicised break was Wagner and Ian Goldberg cracking [[Netscape]]'s [[SSL]] via flaws in the [[random number]] generator. Anderson or his students break almost every [[smartcard]] that comes on the market. Knudsen, Biham, Schneier and Kelsey have all published many papers on [[cryptanalysis]] of various ciphers. Some of the others have various breaks to their credit as well.

Revision as of 20:19, 25 May 2009


The AES competition involved many of the world's top cryptographers.

Some of the major developments in cryptography before AES were:

At least two writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis, Carlisle Adams in CAST and Serge Vaudenay with his decorrelation theory.

Standard references in the field include Bruce Schneier's Applied Cryptography [1] and Ross Anderson's Security Engineering [2].

Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.

Here is a table showing the major players. For many papers, some of the co-authors are omitted to keep it simple; see references in the main article for complete co-author lists.

AES cipherTeam includedAnalysis from
RijndaelRijmen, DaemenFerguson, Schroeppel, Whiting
TwofishSchneier, Kelsey, Whiting, Wagner, Ferguson
SerpentAnderson, Biham, Knudsen
RC6Rivest
MARSCoppersmith
Hasty PuddingSchroeppel
FROGSchneier, Wagner, Ferguson
MagentaSchneier, Biham, Shamir, Ferguson, Knudsen
E2Matsui
DEALKnudsenSchneier, Kelsey
DFCVaudenayKnudsen, Rijmen
CAST-256Adams

Quite a few of these people are also well-known for breaking various ciphers. Perhaps the best-publicised break was Wagner and Ian Goldberg cracking Netscape's SSL via flaws in the random number generator. Anderson or his students break almost every smartcard that comes on the market. Knudsen, Biham, Schneier and Kelsey have all published many papers on cryptanalysis of various ciphers. Some of the others have various breaks to their credit as well.

  1. Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9
  2. Ross Anderson. Security Engineering.