AES competition/Catalogs/AES players

From Citizendium
< AES competition‎ | Catalogs
Revision as of 21:26, 4 June 2009 by imported>Sandy Harris (Block cipher/Catalogs moved to Block cipher/Catalogs/AES players: Give it a more specific name)
Jump to navigation Jump to search

The AES competition involved many of the world's top cryptographers.

Some of the major developments in cryptography before AES were:

At least two writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis, Carlisle Adams in CAST and Serge Vaudenay with his decorrelation theory.

Standard references in the field include Bruce Schneier's Applied Cryptography [1] and Ross Anderson's Security Engineering [2]. At the time of the AES competition, the best online index of current research was the Block Cipher Lounge maintained by Lars Knudsen and Vincent Rijmen.

Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.

Here is a table showing some of the major players. For several papers, some of the co-authors are omitted to make the table more readable; see references in the main article for complete co-author lists.

AES cipherTeam includedAnalysis from
RijndaelRijmen, DaemenFerguson, Schroeppel, Whiting
TwofishSchneier, Kelsey, Whiting, Wagner, Ferguson
SerpentAnderson, Biham, Knudsen
RC6Rivest
MARSCoppersmith
Hasty PuddingSchroeppel
FROGSchneier, Wagner, Ferguson
MagentaSchneier, Biham, Shamir, Ferguson, Knudsen
E2Matsui
DEALKnudsenSchneier, Kelsey
DFCVaudenayKnudsen, Rijmen
CAST-256Adams

Quite a few of these people are also well-known for breaking ciphers or other security systems. Perhaps the best-publicised break was Wagner and Ian Goldberg cracking Netscape's SSL via flaws in the random number generator. Anderson or his students break almost every smartcard that comes on the market. Knudsen, Biham, Schneier and Kelsey have all published many papers on cryptanalysis of various ciphers. Some of the others have various breaks to their credit as well.

References

  1. Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9
  2. Ross Anderson. Security Engineering.