AES competition/Catalogs/AES players: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
(New page: {{subpages}} The AES competition involved many of the world's top cryptographers. Some of the major developments in cryptography before AES were: * [...)
 
imported>Sandy Harris
 
(65 intermediate revisions by 2 users not shown)
Line 1: Line 1:
{{subpages}}
{{subpages}}
The [[Block_cipher#The_AES_generation | AES competition]] involved many of the world's top cryptographers.
The [[Block_cipher#The_AES_generation |'''Advanced Encryption Standard competition''']] (''AES competition'') begun in 1998 involved many of the world's top cryptographers.


Some of the major developments in cryptography before AES were:
Some of the major developments in [[cryptography]] before AES were:
* [[Block_cipher#DES]] from an IBM team that included [[Don Coppersmith]]
* [[Block_cipher#DES|DES]] from an IBM team that included [[Horst Feistel]] and [[Don Coppersmith]]
* [[Linear cryptanalysis]], the first published attack to break DES faster than brute force, from [[Mitsuru Matsui]].
* [[Differential cryptanalysis]], discovered by IBM's DES team, but kept secret at [[NSA]] request. Re-discovered and first published in open literature by [[Eli Biham]] and [[Adi Shamir]].
* [[Differential cryptanalysis]], discovered by Coppersmith et al, but kept secret at [[NSA]] request. Re-discovered and first published in open literature by [[Eli Biham]] and [[Adi Shamir]].
* [[Linear cryptanalysis]], from [[Mitsuru Matsui]].
* The [[RSA]] algorithm for [[public key]] cryptography, from [[Ron Rivest]], [[Adi Shamir]] and [[Leonard Adleman]].
* The [[RSA algorithm]] for [[public key]] cryptography, from [[Ron Rivest]], [[Adi Shamir]] and [[Leonard Adleman]].


At least two writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis, [[Carlisle Adams]] in [[Block_cipher#CAST]] and [[Serge Vaudenay]] with his [[decorrelation theory]].
Both differential and linear cryptanalysis break DES with less effort than brute force, but several writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis — [[Carlisle Adams]] in [[CAST (cipher)|CAST]], [[Serge Vaudenay]] with his [[decorrelation theory]], and [[Lars Knudsen]] and [[Kaisa Nyberg]] with their KN ciphers.
 
There are also several other new attacks that are variants of differential analysis. Biham invented [[related key attack]]s, and [[Lars Knudsen]] used that technique against some ancestors of AES candidates, breaking the first versions of both [[SAFER (cipher)|SAFER]] and [[LOKI (cipher)|LOKI]]. A direct ancestor of [[Rijndael]], the winning AES candidate, was [[Square (cipher)|Square]], designed by [[Joan Daemen]] and [[Vincent Rijmen]]. Knudsen invented [[integral cryptanalysis]] to break that. [[David Wagner]] invented another new technique called the [[boomerang attack]] to break Vaudenay's [[Coconut98]]. All these techniques have since been used to break several other ciphers. However, the AES candidate descendants of the various ciphers broken by them were all designed to resist those attacks.
 
Standard references in the field include [[Bruce Schneier]]'s ''Applied Cryptography''
<ref name="schneier">{{citation
| first = Bruce | last = Schneier
| title = Applied Cryptography
| date = 2nd edition, 1996,
| publisher = John Wiley & Sons
|ISBN =0-471-11709-9}}</ref>,
the later ''Practical Cryptography''
<ref>{{citation
| author = Bruce Schneier & Niels Ferguson
| title = Practical Cryptography
| url = http://macfergus.com/pc/index.html
}}</ref>
by Schneier and [[Niels Ferguson]], and [[Ross Anderson]]'s ''Security Engineering''
<ref>{{cite book|author=Ross Anderson|title=Security Engineering|url=http://www.cl.cam.ac.uk/~rja14/book.html}}</ref>.


Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.
Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.


Here is a table showing the major players. For many papers, some of the co-authors are omitted to keep it simple; see references in the main article for complete co-author lists.
== Summary table ==
 
Here is a table showing some of the major players. For several papers, some of the co-authors are omitted to make the table more readable; see references in the main article for complete co-author lists.
 
<table border=1>
<tr><th>AES cipher</th><th>Team included</th><th>Country</th><th>Attack on ancestor</th><th>Analysis of candidate</th><th>Outcome</th></tr>
<tr><td>[[Rijndael]]</td><td>Rijmen, Daemen</td><td>Belgium</td><td>Knudsen</td><td>Ferguson, Schroeppel, Whiting</td><td>Winner</td></tr>
 
<tr><td>[[Twofish]]</td><td>Schneier, Kelsey, Whiting, Wagner, Ferguson</td><td>US, Holland</td><td></td><td></td><td>Finalist</td></tr>
<tr><td>[[Serpent (cipher)|Serpent]]</td><td>Anderson, Biham, Knudsen</td><td>UK, Israel, Norway</td><td></td><td></td><td>Finalist</td></tr>
 
<tr><td>[[Rivest ciphers|RC6]]</td><td>Rivest</td><td>US</td><td></td><td></td><td>Finalist</td></tr>
<tr><td>[[MARS (cipher)|MARS]]</td><td>Coppersmith</td><td>US</td><td></td><td></td><td>Finalist</td></tr>
 
<tr><td>[[Hasty Pudding (cipher)|Hasty Pudding]]</td><td>Schroeppel</td><td>US</td><td></td><td></td><td></td></tr>
 
<tr><td>[[FROG (cipher)|FROG]]</td><td></td><td>South Africa</td><td></td><td>Schneier, Wagner, Ferguson</td><td>broken</td></tr>
 
<tr><td>[[MAGENTA (cipher)|MAGENTA]]</td><td></td><td>Germany</td><td></td><td>Schneier, Biham, Shamir, Ferguson, Knudsen</td><td>broken</td></tr>
 
<tr><td>[[E2 (cipher)|E2]]</td><td></td><td>Japan</td><td></td><td>Matsui</td><td></td></tr>
 
<tr><td>[[DEAL (cipher)|DEAL]]</td><td>Knudsen</td><td>Norway</td><td></td><td>Schneier, Kelsey</td><td></td></tr>
<tr><td>[[DFC (cipher)|DFC]]</td><td>Vaudenay</td><td>France</td><td>Wagner</td><td>Knudsen, Rijmen</td><td></td></tr>
<tr><td>[[CAST (cipher)|CAST-256]]</td><td>Adams</td><td>Canada</td><td></td><td></td><td></td></tr>
<tr><td>[[LOKI (cipher)|LOKI97]]</td><td>Seberry</td><td>Australia</td><td>Knudsen</td><td></td><td></td></tr>
<tr><td>[[SAFER (cipher)|SAFER+]]</td><td>Massey</td><td>Switzerland</td><td>Knudsen</td><td></td><td></td></tr>
<tr><td>[[CRYPTON (cipher)|CRYPTON]]</td><td></td><td>S Korea</td><td></td><td></td><td></td></tr>
</table>
 
The columns are:
* '''Team included''': Major players involved; many of the teams had other people as well.
* '''Country''': The nationality of the author(s) for most ciphers. Location of the company for RC6, MARS, FROG, and MAGENTA.
* '''Attack on ancestor''': Attacks on previous ciphers, fixed before the candidate ciphers were designed.
* '''Analysis of candidate''': Published work on attacking the actual candidate ciphers,
* '''Outcome''': Cipher status when AES competition ended.


<html xmlns="http://www.w3.org/1999/xhtml"><!--This file was converted to xhtml by OpenOffice.org - see http://xml.openoffice.org/odf2xhtml for more info.--><head profile="http://dublincore.org/documents/dcmi-terms/"><meta http-equiv="Content-Type" content="text/html; charset=utf-8"/><title xml:lang="en-US">- no title specified</title><meta name="DCTERMS.title" content="" xml:lang="en-US"/><meta name="DCTERMS.language" content="en-US" scheme="DCTERMS.RFC4646"/><meta name="DCTERMS.source" content="http://xml.openoffice.org/odf2xhtml"/><meta name="DCTERMS.issued" content="2009-05-26T07:46:05" scheme="DCTERMS.W3CDTF"/><meta name="DCTERMS.modified" content="2009-05-26T08:17:48" scheme="DCTERMS.W3CDTF"/><meta name="DCTERMS.provenance" content="" xml:lang="en-US"/><meta name="DCTERMS.subject" content="," xml:lang="en-US"/><link rel="schema.DC" href="http://purl.org/dc/elements/1.1/" hreflang="en"/><link rel="schema.DCTERMS" href="http://purl.org/dc/terms/" hreflang="en"/><link rel="schema.DCTYPE" href="http://purl.org/dc/dcmitype/" hreflang="en"/><link rel="schema.DCAM" href="http://purl.org/dc/dcam/" hreflang="en"/><base href="."/><style type="text/css">
==References ==
@page {  }
{{reflist|2}}
table { border-collapse:collapse; border-spacing:0; empty-cells:show }
td, th { vertical-align:top; font-size:10pt;}
h1, h2, h3, h4, h5, h6 { clear:both }
ol, ul { margin:0; padding:0;}
li { list-style: none; margin:0; padding:0;}
li span.odfLiEnd { clear: both; line-height:0; width:0; height:0; margin:0; padding:0; }
span.footnodeNumber { padding-right:1em; }
* { margin:0; }
.Default { font-family:Arial; }
.co1 { width:1.6681in; }
.co2 { width:3.2173in; }
.co3 { width:3.5516in; }
.co4 { width:0.8925in; }
.ro1 { height:0.178in; }
<!-- ODF styles with no properties representable as CSS -->
.ta1 { }
</style></head><body dir="ltr"><table border="0" cellspacing="0" cellpadding="0" class="ta1"><colgroup><col width="185"/><col width="357"/><col width="394"/></colgroup><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>AES cipher</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>team included</p></td><td style="text-align:left;width:3.5516in; " class="Default"><p>attackers</p></td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"> </td><td style="text-align:left;width:3.2173in; " class="Default"> </td><td style="text-align:left;width:3.5516in; " class="Default"> </td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>Rijndael</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>Rijmen, Daemen</p></td><td style="text-align:left;width:3.5516in; " class="Default"><p>Ferguson, Schroeppel, Whiting</p></td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>Twofish</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>Schneier, Kelsey, Whiting, Wagner, Ferguson</p></td><td style="text-align:left;width:3.5516in; " class="Default"> </td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>Serpent</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>Anderson, Biham, Knudsen</p></td><td style="text-align:left;width:3.5516in; " class="Default"> </td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>RC6</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>Rivest</p></td><td style="text-align:left;width:3.5516in; " class="Default"> </td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>MARS</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>Coppersmith</p></td><td style="text-align:left;width:3.5516in; " class="Default"> </td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>Hasty Pudding</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>Schroeppel</p></td><td style="text-align:left;width:3.5516in; " class="Default"> </td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>FROG</p></td><td style="text-align:left;width:3.2173in; " class="Default"> </td><td style="text-align:left;width:3.5516in; " class="Default"><p>Schneier, Wagner, Ferguson</p></td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>Magenta</p></td><td style="text-align:left;width:3.2173in; " class="Default"> </td><td style="text-align:left;width:3.5516in; " class="Default"><p>Schneier, Biham, Shamir, Ferguson, Knudsen</p></td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>E2</p></td><td style="text-align:left;width:3.2173in; " class="Default"> </td><td style="text-align:left;width:3.5516in; " class="Default"><p>Matsui</p></td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>DEAL</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>Knudsen</p></td><td style="text-align:left;width:3.5516in; " class="Default"><p>Schneier, Kelsey</p></td></tr><tr class="ro1"><td style="text-align:left;width:1.6681in; " class="Default"><p>DFC</p></td><td style="text-align:left;width:3.2173in; " class="Default"><p>Vaudenay</p></td><td style="text-align:left;width:3.5516in; " class="Default"><p>Knudsen, Rijmen</p></td></tr></table><table border="0" cellspacing="0" cellpadding="0" class="ta1"><colgroup><col width="99"/></colgroup><tr class="ro1"><td style="text-align:left;width:0.8925in; " class="Default"> </td></tr></table><table border="0" cellspacing="0" cellpadding="0" class="ta1"><colgroup><col width="99"/></colgroup><tr class="ro1"><td style="text-align:left;width:0.8925in; " class="Default"> </td></tr></table></body></html>

Latest revision as of 19:23, 19 September 2011


The Advanced Encryption Standard competition (AES competition) begun in 1998 involved many of the world's top cryptographers.

Some of the major developments in cryptography before AES were:

Both differential and linear cryptanalysis break DES with less effort than brute force, but several writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis — Carlisle Adams in CAST, Serge Vaudenay with his decorrelation theory, and Lars Knudsen and Kaisa Nyberg with their KN ciphers.

There are also several other new attacks that are variants of differential analysis. Biham invented related key attacks, and Lars Knudsen used that technique against some ancestors of AES candidates, breaking the first versions of both SAFER and LOKI. A direct ancestor of Rijndael, the winning AES candidate, was Square, designed by Joan Daemen and Vincent Rijmen. Knudsen invented integral cryptanalysis to break that. David Wagner invented another new technique called the boomerang attack to break Vaudenay's Coconut98. All these techniques have since been used to break several other ciphers. However, the AES candidate descendants of the various ciphers broken by them were all designed to resist those attacks.

Standard references in the field include Bruce Schneier's Applied Cryptography [1], the later Practical Cryptography [2] by Schneier and Niels Ferguson, and Ross Anderson's Security Engineering [3].

Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.

Summary table

Here is a table showing some of the major players. For several papers, some of the co-authors are omitted to make the table more readable; see references in the main article for complete co-author lists.

AES cipherTeam includedCountryAttack on ancestorAnalysis of candidateOutcome
RijndaelRijmen, DaemenBelgiumKnudsenFerguson, Schroeppel, WhitingWinner
TwofishSchneier, Kelsey, Whiting, Wagner, FergusonUS, HollandFinalist
SerpentAnderson, Biham, KnudsenUK, Israel, NorwayFinalist
RC6RivestUSFinalist
MARSCoppersmithUSFinalist
Hasty PuddingSchroeppelUS
FROGSouth AfricaSchneier, Wagner, Fergusonbroken
MAGENTAGermanySchneier, Biham, Shamir, Ferguson, Knudsenbroken
E2JapanMatsui
DEALKnudsenNorwaySchneier, Kelsey
DFCVaudenayFranceWagnerKnudsen, Rijmen
CAST-256AdamsCanada
LOKI97SeberryAustraliaKnudsen
SAFER+MasseySwitzerlandKnudsen
CRYPTONS Korea

The columns are:

  • Team included: Major players involved; many of the teams had other people as well.
  • Country: The nationality of the author(s) for most ciphers. Location of the company for RC6, MARS, FROG, and MAGENTA.
  • Attack on ancestor: Attacks on previous ciphers, fixed before the candidate ciphers were designed.
  • Analysis of candidate: Published work on attacking the actual candidate ciphers,
  • Outcome: Cipher status when AES competition ended.

References

  1. Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9
  2. Bruce Schneier & Niels Ferguson, Practical Cryptography
  3. Ross Anderson. Security Engineering.