1998


From: National Institute of Standards and Technology (NIST)

NIST Announces Candidates For New Data Scrambling Standard

Candidates for a new information scrambling code for the 21st century made their debut at an international cryptography conference today.

The Commerce Department's National Institute of Standards and Technology announced the acceptance of 15 sophisticated encoding formulas as candidates for the new encryption standard. Mathematical formulas, called algorithms, are at the heart of computerized encryption systems.

Researchers from 12 different countries worked on developing the formulas unveiled today at the First Advanced Encryption Standard Candidate Conference sponsored by NIST's Information Technology Laboratory.

NIST is inviting the worldwide cryptographic research community to "attack" the formulas in an attempt to break the codes during the first evaluation period, which will end April 15, 1999. Additionally, NIST will evaluate the algorithms for factors such as security and speed.

Reducing the field to five or fewer finalists that will undergo more intensive scrutiny is the goal of this first round of evaluation efforts. Finalists will be identified by the end of the summer of 1999. NIST eventually will propose that one of the 15 algorithms be adopted as the Advanced Encryption Standard. However, detailed analysis is required before this can happen, and the process is structured to build confidence in the AES. Consequently, the process is unlikely to be completed before 2001.

The AES will provide security for encrypted data. It will be a public algorithm designed to protect sensitive government information well into the next century. The AES will replace the Data Encryption Standard currently used by many federal agencies and businesses. NIST adopted DES in 1977 as a Federal Information Processing Standard for use by federal agencies to encrypt sensitive information.

IBM Corp. developed DES, which is used by the federal government and has found widespread acceptance in the private sector, particularly the financial services industry. Like DES, the AES will be available for private-sector use on a royalty-free basis.

NIST requested proposals for the AES on Sept. 12, 1997. A variety of organizations responded, and the 15 algorithms meeting NIST's minimum criteria were announced today at the conference in Ventura, Calif.

Each of the 15 AES candidates supports key sizes of 128, 192 and 256 bits. At a 128 bit key size, there are approximately 340,000,000,000,000,000,000,000,000,000,000, 000,000 (340 followed by 36 zeroes) possible keys.

The conference will run through Saturday, and each submitter of a candidate algorithm will provide a public briefing about its design and answer initial questions.

NIST has accepted the following algorithms as candidates. The list includes the algorithm name, algorithm submitters (and representative, if applicable) and submitter's country:

  • CAST-256--Entrust Technologies (represented by Carlisle Adams), Canada
  • CRYPTON--Future Systems Inc. (represented by Chae Hoon Lim), South Korea
  • DEAL--Richard Outerbridge and Lars Knudsen, Canada and Norway
  • DFC--Centre National pour la Recherche cientifique (CNRS) (represented by Serge Vaudenay), France
  • E2--Nippon Telegraph and Telephone Corp. (NTT) (represented by Masayuki Kanda), Japan
  • FROG--TecApro Internacional S.A. (represented by Dianelos Georgoudis), Costa Rica
  • HPC (Hasty Pudding Cipher)--Rich Schroeppel, U.S.A.
  • LOKI97--Lawrie Brown, Josef Pieprzyk and Jennifer Seberry, Australia
  • MAGENTA--Deutsche Telekom AG (represented by Klaus Huber), Germany
  • MARS--IBM Corp. (represented by Nevenko Zunic), U.S.A.
  • RC6--RSA Laboratories (represented by Matthew Robshaw), U.S.A.
  • Rijndael--Joan Daemen and Vincent Rijmen, Belgium
  • SAFER+--Cylink Corp. (represented by Lily Chen), U.S.A.
  • SERPENT--Ross Anderson, Eli Biham and Lars Knudsen, U.K., israel and Norway
  • TWOFISH--Bruce Schneier, John Kelsey, Doug Whiting, David Wagner, Chris Hall and Niels Ferguson, U.S.A.

More information about the AES is available at http:/www.nist.gov/aes.

NOTE TO REPORTERS AND EDITORS:
Below is a list of press contacts at the organizations that have submitted candidate algorithms.

Advanced Encryption Standard Media Contacts for Candidate Algorithms

NOTE TO EDITORS:
Many of the contacts on this list will be attending the First Advanced Encryption Standard Candidate Conference in Ventura, Calif., on Aug. 20-22, 1998. If you need assistance reaching these contacts during the conference, please call NIST Public and Business Affairs on (301) 975-2762.

CAST-256
Entrust Technologies (represented by Carlisle Adams)
Canada
Media contact: Carlisle Adams
Email: [email protected]
Tel: (613) 247-3180, Fax: (613) 247-3690

CRYPTON
Future Systems Inc. (represented by Chae Hoon Lim)
South Korea
Media contact: Chae Hoon Lim
Email: [email protected]
Tel: +82 2 578 0581 (ext. 557), Fax: +82 2 578 0584

DEAL
Richard Outerbridge and Lars Knudsen
Canada and Norway
Media contact: Richard Outerbridge
Email: [email protected]
Tel: (416) 869-5078, Fax: (416) 869-5080

DFC
Centre National pour la Recherche Scientifique (CNRS) (represented by Serge Vaudenay)
France
Media contact: Serge Vaudenay
Email: [email protected]
Tel: +33 1 44 32 20 61, Fax: +33 1 44 32 20 80

E2
Nippon Telegraph and Telephone Corp. (NTT) (represented by Masayuki Kanda) Japan
Media contacts: Shuuji Shino, Seiichi Kawana, Kazuhisa Sakakibara
Affiliation: R&D Public Relations, NTT R&D Management Department
Email: [email protected]
Tel: +81 3 5359 4220, Fax : +81 3 5359 1190

FROG
TecApro Internacional S.A. (represented by Dianelos Georgoudis)
Costa Rica
Media contact: Dianelos Georgoudis
Email: [email protected]
Tel (business): +506 2344400, or (direct) +506 2344406 Fax: +506 2344401

(HPC) Hasty Pudding Cipher
Rich Schroeppel
U.S.A.
Media contact: Rich Schroeppel
Email: [email protected]
Tel: (703) 243-8073

LOKI97
Lawrie Brown, Josef Pieprzyk and Jennifer Seberry
Australia
Media contact: Lawrie Brown
Email: [email protected]
Tel: +61 2 6268 8816, Fax: +61 2 6268 8581

MAGENTA
Deutsche Telekom AG (represented by Klaus Huber)
Germany
Media contact: Klaus Huber
Email: [email protected]
Tel.: + 49 6151 83 3568, Fax.: + 49 6151 83 4464

MARS
IBM Corp. (represented by Nevenko Zunic)
U.S.A.
Media contact: Gwen Cox
Affiliation: IBM Software Group Public Relations
Email: [email protected]
Tel: (919) 543-8855, Fax: (919) 254-9132

RC6
RSA Laboratories (represented by Matthew Robshaw)
U.S.A.
Media contact: Patrick Corman
Affiliation: Patrick Corman Marketing & Communications>
Email: [email protected]
Tel: (650) 326-9648, Fax: (650) 322-0655

Rijndael
Joan Daemen and Vincent Rijmen
Belgium
Primary media contact: Joan Daemen, PWI
Email: [email protected]
Tel:+32 2 727 65 08, Fax: +32 2 727 62 50

Backup media contact:
Vincent Rijmen, KULeuven
ESAT-COSIC
Tel. +32 16 32 18 62, Fax. +32 16 32 19 86

SAFER+
Cylink Corp. (represented by Lily Chen)
U.S.A.
Media contact:
Gene Carozza,
Sr. Public Relations Manager
Email: [email protected]
Tel: (408) 328-5175, Pager: 1 (800) 716-6434, Fax: (408) 774-2522

SERPENT
Ross Anderson, Eli Biham and Lars Knudsen
U.K., Israel and Norway
Media contact:
Ross Anderson
Email: [email protected]
Tel: +44 1223 334733, Fax: +44 1223 334678

TWOFISH
Bruce Schneier, John Kelsey, Doug Whiting, David Wagner,
Chris Hall and Niels Ferguson
U.S.A.
Media contact:
Bruce Schneier
Email: [email protected]
Tel: (612) 823-1098, Fax: (612) 823-1590




This article comes from Science Blog. Copyright � 2004
http://www.scienceblog.com/community