Block cipher/External Links: Difference between revisions
Jump to navigation
Jump to search
imported>Sandy Harris |
imported>Sandy Harris (→Homepages for block ciphers: add ARIA) |
||
(12 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{subpages}} | ||
{{TOC|right}} | |||
== FAQ documents== | == FAQ documents== | ||
Line 10: | Line 11: | ||
==AES links== | ==AES links== | ||
* [http://www.iaik.tugraz.at/content/research/krypto/AES/ AES Lounge], extensive information, including tables of cryptanalytic results and links to hardware implementations. [[Vincent Rijmen]], one of the designers of AES, is part of the research group that maintains this. | |||
* [http://csrc.nist.gov/archive/aes/rijndael/wsdindex.html NIST page], official page for the AES standard | * [http://csrc.nist.gov/archive/aes/rijndael/wsdindex.html NIST page], official page for the AES standard | ||
* [http://home.cyber.ee/helger/implementations/ software implementations] from Helger Lipmaa | * [http://home.cyber.ee/helger/implementations/ software implementations] from Helger Lipmaa | ||
* [http://gladman.plushost.co.uk/oldsite/AES/index.php software implementations] from Brian Gladwin | * [http://gladman.plushost.co.uk/oldsite/AES/index.php software implementations] from Brian Gladwin | ||
Both of the software sites include implementations of other candidates, as well as of AES itself. | |||
==Homepages for block ciphers== | ==Homepages for block ciphers== | ||
Line 20: | Line 21: | ||
These pages are all maintained by the cipher designers. They include links to the design papers, to implementations, and often to attacks. We list them alphabetically. | These pages are all maintained by the cipher designers. They include links to the design papers, to implementations, and often to attacks. We list them alphabetically. | ||
* [http://www.iaik.tugraz.at/content/research/krypto/AES/ AES Lounge], see above | |||
* [http://210.104.33.10/ARIA/index-e.html ARIA] | |||
* [http://www.schneier.com/blowfish.html Blowfish] | * [http://www.schneier.com/blowfish.html Blowfish] | ||
* [http://info.isl.ntt.co.jp/crypt/eng/camellia/index.html Camellia] | * [http://info.isl.ntt.co.jp/crypt/eng/camellia/index.html Camellia] | ||
* [http://lasecwww.epfl.ch/memo/dfc.shtml DFC] | |||
* [http://www.cs.arizona.edu/~rcs/hpc/ Hasty Pudding] | * [http://www.cs.arizona.edu/~rcs/hpc/ Hasty Pudding] | ||
* [http://www.unsw.adfa.edu.au/~lpb/research/loki97/ LOKI97] | * [http://www.unsw.adfa.edu.au/~lpb/research/loki97/ LOKI97] | ||
Line 29: | Line 33: | ||
* [http://www.cl.cam.ac.uk/~rja14/serpent.html Serpent] | * [http://www.cl.cam.ac.uk/~rja14/serpent.html Serpent] | ||
* [http://143.53.36.235:8080/tea.htm TEA] | * [http://143.53.36.235:8080/tea.htm TEA] | ||
* [http://www.skein-hash.info/ Threefish] | |||
* [http://www.schneier.com/twofish.html Twofish] | * [http://www.schneier.com/twofish.html Twofish] | ||
Line 47: | Line 52: | ||
* [http://www.schneier.com/paper-self-study.pdf Self-study course in block cipher cryptanalysis] from [[Bruce Schneier]], PDF format | * [http://www.schneier.com/paper-self-study.pdf Self-study course in block cipher cryptanalysis] from [[Bruce Schneier]], PDF format | ||
== | == Literature surveys == | ||
* [http://nal-ir.nal.res.in/4496/ A Report on Block Ciphers (Literature Survey)], concentrating on Feistel ciphers, from the Indian National Aeronautics Lab | * [http://nal-ir.nal.res.in/4496/ A Report on Block Ciphers (Literature Survey)], concentrating on Feistel ciphers, from the Indian National Aeronautics Lab | ||
Line 57: | Line 58: | ||
* [http://www.citeulike.org/user/sgros/article/229817 Cryptanalysis of Block Ciphers: A Survey] by Standaert et al. | * [http://www.citeulike.org/user/sgros/article/229817 Cryptanalysis of Block Ciphers: A Survey] by Standaert et al. | ||
* [http://www.ciphersbyritter.com/RES/SBOXDESN.HTM S-Box Design: A Literature Survey] from Terry Ritter | * [http://www.ciphersbyritter.com/RES/SBOXDESN.HTM S-Box Design: A Literature Survey] from Terry Ritter | ||
== Other links == | |||
* The [http://www2.mat.dtu.dk/people/Lars.R.Knudsen/bc.html Block Cipher Lounge] was once an excellent index of current research, with links to design papers and cryptanalytic results for all the well-known block ciphers. It still has some good links but is now quite out-of-date. | |||
* Several of the books in our [[Block_cipher/Bibliography|bibliography]] are available as free PDF downloads. |
Latest revision as of 22:49, 7 June 2012
- Please sort and annotate in a user-friendly manner and consider archiving the URLs behind the links you provide. See also related web sources.
FAQ documents
There are no FAQs specifically on block ciphers, but these ciphers are covered in cryptography FAQs.
- RSA Laboratories' Frequently Asked Questions About Today's Cryptography, a good introduction but not up-to-date
- Index of cryptography FAQs with links to the ten parts of the main cryptography FAQ, plus a few others. The main section on block ciphers is in part 5 of the crypto FAQ.
AES links
- AES Lounge, extensive information, including tables of cryptanalytic results and links to hardware implementations. Vincent Rijmen, one of the designers of AES, is part of the research group that maintains this.
- NIST page, official page for the AES standard
- software implementations from Helger Lipmaa
- software implementations from Brian Gladwin
Both of the software sites include implementations of other candidates, as well as of AES itself.
Homepages for block ciphers
These pages are all maintained by the cipher designers. They include links to the design papers, to implementations, and often to attacks. We list them alphabetically.
- AES Lounge, see above
- ARIA
- Blowfish
- Camellia
- DFC
- Hasty Pudding
- LOKI97
- MARS
- RC5 and RC6
- SEED
- Serpent
- TEA
- Threefish
- Twofish
RFCs for block ciphers
These RFCs give specifications for the block ciphers themselves.
There are other RFCs covering block cipher modes of operation and how these ciphers should be used in protocols such as IPsec, Open PGP, SSL and SSH. For details, see the linked articles or use RFC search.
Online courses
- Godzilla crypto tutorial from Peter Gutmann, 973 slides in twelve sections, PDF format. Section two has the block cipher overview.
- Self-study course in block cipher cryptanalysis from Bruce Schneier, PDF format
Literature surveys
- A Report on Block Ciphers (Literature Survey), concentrating on Feistel ciphers, from the Indian National Aeronautics Lab
- Survey and benchmark of block ciphers for wireless sensor networks, partly literature survey and partly requirements analysis for wireless applications
- Cryptanalysis of Block Ciphers: A Survey by Standaert et al.
- S-Box Design: A Literature Survey from Terry Ritter
Other links
- The Block Cipher Lounge was once an excellent index of current research, with links to design papers and cryptanalytic results for all the well-known block ciphers. It still has some good links but is now quite out-of-date.
- Several of the books in our bibliography are available as free PDF downloads.