AES competition/Catalogs/AES players
|The metadata subpage is missing. You can start it via filling in this form or by following the instructions that come up after clicking on the [show] link to the right.|
The Advanced Encryption Standard competition (AES competition) begun in 1998 involved many of the world's top cryptographers.
Some of the major developments in cryptography before AES were:
- DES from an IBM team that included Horst Feistel and Don Coppersmith
- Differential cryptanalysis, discovered by IBM's DES team, but kept secret at NSA request. Re-discovered and first published in open literature by Eli Biham and Adi Shamir.
- Linear cryptanalysis, from Mitsuru Matsui.
- The RSA algorithm for public key cryptography, from Ron Rivest, Adi Shamir and Leonard Adleman.
Both differential and linear cryptanalysis break DES with less effort than brute force, but several writers have proposed methods of making ciphers provably resistant to linear and differential cryptanalysis — Carlisle Adams in CAST, Serge Vaudenay with his decorrelation theory, and Lars Knudsen and Kaisa Nyberg with their KN ciphers.
There are also several other new attacks that are variants of differential analysis. Biham invented related key attacks, and Lars Knudsen used that technique against some ancestors of AES candidates, breaking the first versions of both SAFER and LOKI. A direct ancestor of Rijndael, the winning AES candidate, was Square, designed by Joan Daemen and Vincent Rijmen. Knudsen invented integral cryptanalysis to break that. David Wagner invented another new technique called the boomerang attack to break Vaudenay's Coconut98. All these techniques have since been used to break several other ciphers. However, the AES candidate descendants of the various ciphers broken by them were all designed to resist those attacks.
Most of the people mentioned above, and a number of others well-known in the field, participated in the AES process.
Here is a table showing some of the major players. For several papers, some of the co-authors are omitted to make the table more readable; see references in the main article for complete co-author lists.
|AES cipher||Team included||Country||Attack on ancestor||Analysis of candidate||Outcome|
|Rijndael||Rijmen, Daemen||Belgium||Knudsen||Ferguson, Schroeppel, Whiting||Winner|
|Twofish||Schneier, Kelsey, Whiting, Wagner, Ferguson||US, Holland||Finalist|
|Serpent||Anderson, Biham, Knudsen||UK, Israel, Norway||Finalist|
|FROG||South Africa||Schneier, Wagner, Ferguson||broken|
|MAGENTA||Germany||Schneier, Biham, Shamir, Ferguson, Knudsen||broken|
The columns are:
- Team included: Major players involved; many of the teams had other people as well.
- Country: The nationality of the author(s) for most ciphers. Location of the company for RC6, MARS, FROG, and MAGENTA.
- Attack on ancestor: Attacks on previous ciphers, fixed before the candidate ciphers were designed.
- Analysis of candidate: Published work on attacking the actual candidate ciphers,
- Outcome: Cipher status when AES competition ended.