AES competition/Catalogs/AES players: Difference between revisions

From Citizendium
Jump to navigation Jump to search
imported>Sandy Harris
imported>Sandy Harris
Line 33: Line 33:
<tr><td>[[Twofish]]</td><td>Schneier, Kelsey, Whiting, Wagner, Ferguson</td><td>US & others</td><td></td><td></td><td>Finalist</td></tr>
<tr><td>[[Twofish]]</td><td>Schneier, Kelsey, Whiting, Wagner, Ferguson</td><td>US & others</td><td></td><td></td><td>Finalist</td></tr>
 
 
<tr><td>[[Serpent (cipher)|Serpent]]</td><td>Anderson, Biham, Knudsen</td><td>UK< Israel,Norway</td><td></td><td></td><td>Finalist</td></tr>  
<tr><td>[[Serpent (cipher)|Serpent]]</td><td>Anderson, Biham, Knudsen</td><td>UK, Israel, Norway</td><td></td><td></td><td>Finalist</td></tr>  


<tr><td>[[Rivest ciphers|RC6]]</td><td>Rivest</td><td>US</td><td></td><td></td><td>Finalist</td></tr>
<tr><td>[[Rivest ciphers|RC6]]</td><td>Rivest</td><td>US</td><td></td><td></td><td>Finalist</td></tr>
Line 41: Line 41:
<tr><td>[[Hasty Pudding (cipher)|Hasty Pudding]]</td><td>Schroeppel</td><td>US</td><td></td><td></td><td></td></tr>
<tr><td>[[Hasty Pudding (cipher)|Hasty Pudding]]</td><td>Schroeppel</td><td>US</td><td></td><td></td><td></td></tr>


<tr><td>[[FROG (cipher)|FROG]]</td><td></td><td></td><td></td><td>Schneier, Wagner, Ferguson</td><td></td></tr>
<tr><td>[[FROG (cipher)|FROG]]</td><td></td><td>South Africa</td><td></td><td>Schneier, Wagner, Ferguson</td><td></td></tr>


<tr><td>[[MAGENTA (cipher)|MAGENTA]]</td><td></td><td>Germany</td><td></td><td>Schneier, Biham, Shamir, Ferguson, Knudsen</td><td></td></tr>
<tr><td>[[MAGENTA (cipher)|MAGENTA]]</td><td></td><td>Germany</td><td></td><td>Schneier, Biham, Shamir, Ferguson, Knudsen</td><td></td></tr>
Line 47: Line 47:
<tr><td>[[E2 (cipher)|E2]]</td><td></td><td>Japan</td><td></td><td></td><td>Matsui</td><td></td></tr>
<tr><td>[[E2 (cipher)|E2]]</td><td></td><td>Japan</td><td></td><td></td><td>Matsui</td><td></td></tr>


<tr><td>[[DEAL (cipher)|DEAL]]</td><td></td><td>Knudsen</td><td></td><td>Schneier, Kelsey</td><td></td></tr>
<tr><td>[[DEAL (cipher)|DEAL]]</td><td>Knudsen</td><td></td><td></td><td>Schneier, Kelsey</td><td></td></tr>
<tr><td>[[DFC (cipher)|DFC]]</td><td>Vaudenay</td><td>France</td><td>Wagner</td><td>Knudsen, Rijmen</td><td></td></tr>
<tr><td>[[DFC (cipher)|DFC]]</td><td>Vaudenay</td><td>France</td><td>Wagner</td><td>Knudsen, Rijmen</td><td></td></tr>
<tr><td>[[CAST (cipher)|CAST-256]]</td><td>Adams</td><td>Canada</td><td></td><td></td><td></td></tr>
<tr><td>[[CAST (cipher)|CAST-256]]</td><td>Adams</td><td>Canada</td><td></td><td></td><td></td></tr>

Revision as of 19:43, 18 September 2011


The Advanced Encryption Standard competition (AES competition) begun in 1998 involved many of the world's top cryptographers.

Some of the major developments in cryptography before AES were:

Both differential and linear cryptanalysis break DES with less effort than brute force, but several writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis — Carlisle Adams in CAST, Serge Vaudenay with his decorrelation theory, and Lars Knudsen and Kaisa Nyberg with their KN ciphers.

There are also several other new attacks that are variants of differential analysis. Biham invented related key attacks, and Lars Knudsen used that technique against some ancestors of AES candidates, breaking the first versions of both SAFER and LOKI. A direct ancestor of Rijndael, the winning AES candidate, was Square, designed by Joan Daemen and Vincent Rijmen. Knudsen invented integral cryptanalysis to break that. David Wagner invented another new technique called the boomerang attack to break Vaudenay's Coconut98. All these techniques have since been used to break several other ciphers. However, the AES candidate descendants of the various ciphers broken by them were all designed to resist those attacks.

Standard references in the field include Bruce Schneier's Applied Cryptography [1] and Ross Anderson's Security Engineering [2].

Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.

Summary table

Here is a table showing some of the major players. For several papers, some of the co-authors are omitted to make the table more readable; see references in the main article for complete co-author lists.

AES cipherTeam includedCountryAttack on ancestorAnalysis of candidateOutcome
RijndaelRijmen, DaemenBelgiumKnudsenFerguson, Schroeppel, WhitingWinner
TwofishSchneier, Kelsey, Whiting, Wagner, FergusonUS & othersFinalist
SerpentAnderson, Biham, KnudsenUK, Israel, NorwayFinalist
RC6RivestUSFinalist
MARSCoppersmithUSFinalist
Hasty PuddingSchroeppelUS
FROGSouth AfricaSchneier, Wagner, Ferguson
MAGENTAGermanySchneier, Biham, Shamir, Ferguson, Knudsen
E2JapanMatsui
DEALKnudsenSchneier, Kelsey
DFCVaudenayFranceWagnerKnudsen, Rijmen
CAST-256AdamsCanada
LOKI97SeberryAustraliaKnudsen
SAFER+MasseySwitzerlandKnudsen
CRYPTONS Korea

References

  1. Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9
  2. Ross Anderson. Security Engineering.