Abstract
The NESSIE project (New European Schemes for Signature, Integrity and Encryption) intends to put forward a portfolio containing the next generation of cryptographic primitives. These primitives will offer a higher security level than existing primitives, and/or will offer a higher confidence level, built up by an open evaluation process. Moreover, they should be better suited for the constraints of future hardware and software environments. In order to reach this goal, the project has launched an open call in March 2000. In response to this call, 39 primitives have been submitted by September 29, 2000, many of these from major players. Currently, the NESSIE evaluation process is under way; it considers both security and performance aspects. This article presents the status of the NESSIE project after 15 months.
Chapter PDF
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
S. Babbage, “Cryptanalysis of LILI-128,” Preprint, 2001.
P. Barreto, V. Rijmen, J. Nakahara Jr., B. Preneel, J. Vandewalle, H. Kim, “Improved Square attacks against reduced-round Hierocrypt,” Preproceedings Fast Software Encryption 2001, M. Matsui, Ed.
E. Biham, “New types of cryptanalytic attacks using related keys,” Advances in Cryptology, Proceedings Eurocrypt’93, LNCS 765, T. Helleseth, Ed., Springer-Verlag, 1994, pp. 398–409.
E. Biham, V. Furman, M. Misztal, V. Rijmen, “Differential Cryptanalysis of Q,” Preproceedings Fast Software Encryption 2001, M. Matsui, Ed.
E. Biham, A. Shamir, “Differential Cryptanalysis of the Data Encryption Standard,” Springer-Verlag, 1993.
E. Biham, A. Shamir, “Differential fault analysis of secret key cryptosystems,” Advances in Cryptology, Proceedings Crypto’97, LNCS 1294, B. Kaliski, Ed., Springer-Verlag, 1997, pp. 513–525.
D. Boneh, R. A. DeMillo, R. J. Lipton, “On the importance of checking cryptographic protocols for faults,” Advances in Cryptology, Proceedings Eurocrypt’97, LNCS 1233, W. Fumy, Ed., Springer-Verlag, 1997, pp. 37–51.
P. Crowley, S. Lucks, “Bias in the Leviathan stream cipher,” Preproceedings Fast Software Encryption 2001, M. Matsui, Ed.
J. Daemen, V. Rijmen, “AES proposal Rijndael,” September 3, 1999, available from http://www.nist.gov/aes.
FIPS 180-1, “Secure Hash Standard,” Federal Information Processing Standard (FIPS), Publication 180-1, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., April 17, 1995.
FIPS XXX “Advanced Encryption Standard (AES),” Washington D.C.: NIST, US Department of Commerce, Draft, February 28, 2001.
V. Furman, “Differential cryptanalysis of Nimbus,” Preproceedings Fast Software Encryption 2001, M. Matsui, Ed.
P. Kocher, “Timing attacks on implementations of Diffie-Hellman, RSA, DSS, and other systems,” Advances in Cryptology, Proceedings Crypto’96, LNCS 1109, N. Koblitz, Ed., Springer-Verlag, 1996, pp. 104–113.
P. Kocher, J. Jaffe, B. Jun, “Differential power analysis,” Advances in Cryptology, Proceedings Crypto’99, LNCS 1666, M.J. Wiener, Ed., Springer-Verlag, 1999, pp. 388–397.
M. Matsui, “The first experimental cryptanalysis of the Data Encryption Standard,” Advances in Cryptology, Proceedings Crypto’94, LNCS 839, Y. Desmedt, Ed., Springer-Verlag, 1994, pp. 1–11.
U.M. Maurer, “A universal statistical test for random bit generators,” Advances in Cryptology, Proceedings Crypto’90, LNCS 537, S. Vanstone, Ed., Springer-Verlag, 1991, pp. 409–420.
A.J. Menezes, P.C. van Oorschot, S.A. Vanstone, “Handbook of Applied Cryptography, ” CRC Press, 1997.
NIST, “SHA-256, SHA-384, SHA-512,” Washington D.C.: NIST, US Department of Commerce, Draft, 2000.
NIST, “A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications,” NIST Special Publication 800-22, National Institute of Standards and Technology, US Department of Commerce, Washington D.C., December 2000.
RIPE, “Integrity Primitives for Secure Information Systems. Final Report of RACE Integrity Primitives Evaluation (RIPE-RACE 1040),” LNCS 1007, A. Bosselaers, B. Preneel, Eds., Springer-Verlag, 1995.
S. Vaudenay, “An experiment on DES — statistical cryptanalysis,” Proceedings 1996 ACM Conference on Computer and Communications Security, March 14–15, New Delhi, India, 1996, pp. 139–147.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2002 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Preneel, B. (2002). NESSIE: A European Approach to Evaluate Cryptographic Algorithms. In: Matsui, M. (eds) Fast Software Encryption. FSE 2001. Lecture Notes in Computer Science, vol 2355. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45473-X_22
Download citation
DOI: https://doi.org/10.1007/3-540-45473-X_22
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-43869-4
Online ISBN: 978-3-540-45473-1
eBook Packages: Springer Book Archive