-Caveat Lector-

from:
http://csrc.nist.gov/encryption/aes/
Click Here: <A HREF="http://csrc.nist.gov/encryption/aes/">Advanced
Encryption Standard (AES) Development …</A>
-----


Advanced Encryption Standard (AES)
Development Effort



GENERAL
AES Home Page
Modes of Operation Workshop
Recent News
ROUND 2
(8/1999-5/2000)
AES Finalists:
NIST's Round 1 Report
Finalist Algorithm Information
Round 2 Analysis
Round 2 Comments
Discussion Forum
3rd AES Conference
ROUND 1
(8/1998-4/1999)
R1 Algorithms
R1 Announcement
R1 Comments
2nd AES Conference
1st AES Conference
Pre-ROUND 1
(1/1997-7/1998)
Call for Candidates
AES Beginnings *** RIJNDAEL ***
Selected by NIST
for the Proposed AES
October 2, 2000
[Note: Apparently, one of our NIST servers was down for a while today, making
the webcast inaccessible. It also has led to a delay in these AES pages being
updated. We will try to make the "archived" webcast available as soon as
possible.]


*   Press Release
*   AES Fact Sheet (please review before contacting NIST with questions!)
*   NIST's Report on the Development of the Advanced Encryption Standard
(AES), which summarizes NIST's selection and the public comments, is now
available.
*   Rijndael information (specifications, code, test values, etc.)



Recent Announcements

October 2, 2000 - NIST announces that Rijndael has been selected as the
proposed AES.
September 29, 2000 - Information on the October 20, 2000 Modes of Operation
Workshop is still available, and comments are invited.
August 7, 2000 - VHDL models developed by NSA to evaluate the hardware
performance of the five finalists is available.
Additional AES "News" from Round 2.

------------------------------------------------------------------------

------------------------------------------------------------------------
SPECIAL NOTE - Intellectual Property
NIST reminds all interested parties that the adoption of AES is being
conducted as an open standards-setting activity. Specifically, NIST has
requested that all interested parties identify to NIST any patents or
inventions that may be required for the use of AES. NIST hereby gives public
notice that it may seek redress under the antitrust laws of the United States
against any party in the future who might seek to exercise patent rights
against any user of AES that have not been disclosed to NIST in response to
this request for information.

------------------------------------------------------------------------

Overview of the AES Development Effort

August, 1999
The National Institute of Standards and Technology (NIST) has been working
with industry and the cryptographic community to develop an Advanced
Encryption Standard (AES). The overall goal is to develop a Federal
Information Processing Standard (FIPS) that specifies an encryption
algorithm(s) capable of protecting sensitive government information well into
the next century. The algorithm(s) is expected to be used by the U.S.
Government and, on a voluntary basis, by the private sector.
On January 2, 1997, NIST announced the initiation of the AES development
effort and made a formal call for algorithms on September 12, 1997. The call
stipulated that the AES would specify an unclassified, publicly disclosed
encryption algorithm(s), available royalty-free, worldwide. In addition, the
algorithm(s) must implement symmetric key cryptography as a block cipher and
(at a minimum) support block sizes of 128-bits and key sizes of 128-, 192-,
and 256-bits.
On August 20, 1998, NIST announced a group of fifteen AES candidate
algorithms at the First AES Candidate Conference (AES1). These algorithms had
been submitted by members of the cryptographic community from around the
world. At that conference and in a simultaneously published Federal Register
notice, NIST solicited public comments on the candidates. A Second AES
Candidate Conference (AES2) was held in March 1999 to discuss the results of
the analysis conducted by the global cryptographic community on the candidate
algorithms. The public comment period on the initial review of the algorithms
closed on April 15, 1999. Using the analyses and comments received, NIST
selected five algorithms from the fifteen.
The AES finalist candidate algorithms are MARS, RC6, Rijndael, Serpent, and
Twofish. NIST has developed a Round 1 Report describing the selection of the
finalists.
These finalist algorithms received further analysis during a second, more
in-depth review period prior to the selection of the final algorithm(s) for
the AES FIPS. Until May 15, 2000, NIST solicited public comments on the
remaining algorithms. Comments and analysis were actively sought by NIST on
any aspect of the candidate algorithms, including, - but not limited to, -
the following topics: cryptanalysis, intellectual property, crosscutting
analyses of all of the AES finalists, overall recommendations and
implementation issues. An informal AES discussion forum is also provided by
NIST for interested parties to discuss the AES finalists and relevant AES
issues.
Near the end of Round 2, NIST sponsored the Third AES Candidate Conference
(AES3) - an open, public forum for discussion of the analyses of the AES
finalists. AES3 was held April 13-14, 2000 in New York, NY, USA. Submitters
of the AES finalists were invited to attend and engage in discussions
regarding comments on their algorithms. NIST is providing a final agenda
which includes links to the papers that were accepted for AES3, their
presentations (if available), the submitter statements, and the submitter
presentations. All papers proposed for this conference are considered as
official Round 2 public comments.
Since the close of the Round 2 public analysis period on May 15, 2000, NIST
has been studying all available information in order to make a selection for
the AES. Currently, NIST anticipates that it will announce the AES selection
by late summer or early fall of 2000. No firm date has been set for this
announcement, which will be made using a press release and information on
this AES home page, at a minimum. Concurrent with the announcement, NIST will
publish a "Round 2 Report" that will summarize information from Round 2 and
explain NIST's selection.
Shortly after the announcement, a draft Federal Information Processing
Standard (FIPS) for the AES will be published for public review and comment.
Following the comment period (of at least three months), the standard will be
revised by NIST, as appropriate, in response to those comments. A review,
approval, and promulgation process will then follow. If all steps of the AES
development process proceed as planned, it is anticipated that the standard
will be completed by the summer of 2001. At the time that NIST publishes the
AES standard, it is intended that validation testing (i.e., conformance
testing) for AES implementations will be available through NIST's
Cryptographic Module Validation Program.

------------------------------------------------------------------------

Last Modified: October 2, 2000
Questions?
Press Contacts
Computer Security Division
National Institute of Standards and Technology
NIST is an agency of the U.S. Commerce Department's Technology Administration
NIST Disclaimer and Privacy Notice
-----
Aloha, He'Ping,
Om, Shalom, Salaam.
Em Hotep, Peace Be,
All My Relations.
Omnia Bona Bonis,
Adieu, Adios, Aloha.
Amen.
Roads End

<A HREF="http://www.ctrl.org/">www.ctrl.org</A>
DECLARATION & DISCLAIMER
==========
CTRL is a discussion & informational exchange list. Proselytizing propagandic
screeds are unwelcomed. Substance—not soap-boxing—please!  These are
sordid matters and 'conspiracy theory'—with its many half-truths, mis-
directions and outright frauds—is used politically by different groups with
major and minor effects spread throughout the spectrum of time and thought.
That being said, CTRLgives no endorsement to the validity of posts, and
always suggests to readers; be wary of what you read. CTRL gives no
credence to Holocaust denial and nazi's need not apply.

Let us please be civil and as always, Caveat Lector.
========================================================================
Archives Available at:
http://peach.ease.lsoft.com/archives/ctrl.html
 <A HREF="http://peach.ease.lsoft.com/archives/ctrl.html">Archives of
[EMAIL PROTECTED]</A>

http:[EMAIL PROTECTED]/
 <A HREF="http:[EMAIL PROTECTED]/">ctrl</A>
========================================================================
To subscribe to Conspiracy Theory Research List[CTRL] send email:
SUBSCRIBE CTRL [to:] [EMAIL PROTECTED]

To UNsubscribe to Conspiracy Theory Research List[CTRL] send email:
SIGNOFF CTRL [to:] [EMAIL PROTECTED]

Om

Reply via email to