NIST Performance Analysis of the Final Round JavaTM AES Candidates
نویسنده
چکیده
NIST solicited candidate algorithms for the Advanced Encryption Standard (AES) in a Federal Register Announcement dated September 12, 1997[1]. Fifteen of the submissions were deemed “complete and proper” as defined in the Announcement, and entered the first round of the AES selection process in August 1998. Since that time, NIST has been working with a worldwide community of cryptographers to evaluate the submissions according to the criteria established in[1]. Five candidates were subsequently chosen to enter the final round of the selection process: MARS, RC6, Rijndael, Serpent, and Twofish.
منابع مشابه
FPGA and ASIC Implementations of AES
In 1997, an effort was initiated to develop a new American encryption standard to be commonly used well into the next century. This new standard was given a name AES, Advanced Encryption Standard. A new algorithm was selected through a contest organized by the National Institute of Standards and Technology (NIST). By June 1998, 15 candidate algorithms had been submitted to NIST by research grou...
متن کاملFuture Resiliency: a Possible New Aes Evaluation Criterion
As announced by NIST, AES candidates will be evaluated on the criteria of security, cost (including performance and code size), and implementation characteristics such as flexibility and simplicity. This paper introduces the new term of “future resiliency” and proposes that NIST strive to ensure that the initial culling of the fifteen initial AES candidates to “about five” second round finalist...
متن کاملDear NIST , all , In round 1 technical evaluation , NIST intends to perform an efficiency analysis on Intel
We would like to explain why AES instructions should be considered: Based on our observation that Intel CPU performance figures of several SHA-3 candidates are due to the use of instructions in SSE, we think that new version of SSE which employs AES instructions should be considered as the same way as the current version of it. We expect that Intel CPUs with AES instructions will be widely used...
متن کاملPerformance Analysis of the SHA-3 Candidates on Exotic Multi-core Architectures
The NIST hash function competition to design a new cryptographic hash standard ‘SHA-3’ is currently one of the hot topics in cryptologic research, its outcome heavily depends on the public evaluation of the remaining 14 candidates. There have been several cryptanalytic efforts to evaluate the security of these hash functions. Concurrently, invaluable benchmarking efforts have been made to measu...
متن کاملGeneral classification of the authenticated encryption schemes for the CAESAR competition
An Authenticated encryption scheme is a scheme which provides privacy and integrity by using a secret key. In 2013, CAESAR (the “Competition for Authenticated Encryption: Security, Applicability, and Robustness”) was co-founded by NIST and Dan Bernstein with the aim of finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. The first...
متن کامل