AES competition/Catalogs/AES players: Difference between revisions
imported>Sandy Harris No edit summary |
imported>Sandy Harris No edit summary |
||
Line 21: | Line 21: | ||
Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process. | Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process. | ||
Here is a table showing the major players. For many papers, some of the co-authors are omitted to keep it simple; see references in the main article for complete co-author lists. | Here is a table showing some of the major players. For many papers, some of the co-authors are omitted to keep it simple; see references in the main article for complete co-author lists. | ||
<table border=1> | <table border=1> |
Revision as of 21:58, 25 May 2009
The metadata subpage is missing. You can start it via filling in this form or by following the instructions that come up after clicking on the [show] link to the right. | |||
---|---|---|---|
|
The AES competition involved many of the world's top cryptographers.
Some of the major developments in cryptography before AES were:
- DES from an IBM team that included Don Coppersmith
- Differential cryptanalysis, discovered by Coppersmith et al, but kept secret at NSA request. Re-discovered and first published in open literature by Eli Biham and Adi Shamir.
- Linear cryptanalysis, from Mitsuru Matsui.
- The RSA algorithm for public key cryptography, from Ron Rivest, Adi Shamir and Leonard Adleman.
At least two writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis, Carlisle Adams in CAST and Serge Vaudenay with his decorrelation theory.
Standard references in the field include Bruce Schneier's Applied Cryptography [1] and Ross Anderson's Security Engineering [2].
Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.
Here is a table showing some of the major players. For many papers, some of the co-authors are omitted to keep it simple; see references in the main article for complete co-author lists.
AES cipher | Team included | Analysis from |
---|---|---|
Rijndael | Rijmen, Daemen | Ferguson, Schroeppel, Whiting |
Twofish | Schneier, Kelsey, Whiting, Wagner, Ferguson | |
Serpent | Anderson, Biham, Knudsen | |
RC6 | Rivest | |
MARS | Coppersmith | |
Hasty Pudding | Schroeppel | |
FROG | Schneier, Wagner, Ferguson | |
Magenta | Schneier, Biham, Shamir, Ferguson, Knudsen | |
E2 | Matsui | |
DEAL | Knudsen | Schneier, Kelsey |
DFC | Vaudenay | Knudsen, Rijmen |
CAST-256 | Adams |
Quite a few of these people are also well-known for breaking various ciphers. Perhaps the best-publicised break was Wagner and Ian Goldberg cracking Netscape's SSL via flaws in the random number generator. Anderson or his students break almost every smartcard that comes on the market. Knudsen, Biham, Schneier and Kelsey have all published many papers on cryptanalysis of various ciphers. Some of the others have various breaks to their credit as well.
References
- ↑ Schneier, Bruce (2nd edition, 1996,), Applied Cryptography, John Wiley & Sons, ISBN 0-471-11709-9
- ↑ Ross Anderson. Security Engineering.