From: “Mullen, Patrick” <Patrick.Mullen@GSC.GTE.Com>
To: “‘Cypherpunks’” <cryptography@c2.net>
Message Hash: 50d2a526882e271c87decc651e4c104c33e0880aad651dfa658cd90301bef98e
Message ID: <c=US%a=%p=GTE%l=NDHM06-970219154727Z-8296@ndhm06.ndhm.gtegsc.com>
Reply To: _N/A
UTC Datetime: 1997-02-19 15:48:10 UTC
Raw Date: Wed, 19 Feb 1997 07:48:10 -0800 (PST)
From: "Mullen, Patrick" <Patrick.Mullen@GSC.GTE.Com>
Date: Wed, 19 Feb 1997 07:48:10 -0800 (PST)
To: "'Cypherpunks'" <cryptography@c2.net>
Subject: FW: Rules for The Great DES Replacement Contest
Message-ID: <c=US%a=_%p=GTE%l=NDHM06-970219154727Z-8296@ndhm06.ndhm.gtegsc.com>
MIME-Version: 1.0
Content-Type: text/plain
>---------- Forwarded message ----------
>Date: Wed, 19 Feb 1997 09:24:38 -0500 (EST)
>From: Christof Paar <christof@ece.WPI.EDU>
>To: christof@ece.WPI.EDU
>Subject: (fwd) Rules for The Great DES Replacement Contest
>Newsgroups: sci.crypt
>
>
>Rules for The Great DES Replacement Contest
>
>On 1997 Jan 02, the National Institute of Standards and Technology
>of The Department of Commerce announced the start of a process to
>approve an "Advanced Encryption Standard." (See the Federal
>Register Vol. 62, No. 1, pp. 93-94; for example, by going to
>
> http://www.lib.auburn.edu/gpo/index.html
>
>and searching the Federal Register for "Advanced Encryption
>Standard.")
>
>
>The first part of the process seems to be requesting comments
>on the cipher requirements and submission guidelines as follows:
>
>"Proposed Draft Minimum Acceptability Requirements and Evaluation
>Criteria
>
> "The draft minimum acceptability requirements and evaluation
>criteria are:
> A.1 AES shall be publicly defined.
> A.2 AES shall be a symmetric block cipher.
> A.3 AES shall be designed so that the key length may be increased
>as needed.
> A.4 AES shall be implementable in both hardware and software.
> A.5 AES shall either be (a) freely available or (b) available
>under terms consistent with the American National Standards Institute
>(ANSI) patent policy.
> A.6 Algorithms which meet the above requirements will be judged
>based on the following factors:
> (a) Security (i.e., the effort required to cryptanalyze),
> (b) Computational efficiency,
> (c) Memory requirements,
> (d) Hardware and software suitability,
> (e) Simplicity,
> (f) Flexibility, and
> (g) Licensing requirements."
>
>
>"Proposed Draft Submission Requirements"
>
> "In order to provide for an orderly, fair, and timely evaluation of
>candidate algorithm proposals, submission requirements will specify the
>procedures and supporting documentation necessary to submit a candidate
>algorithm.
>
> B.1 A complete written specification of the algorithm including
>all necessary mathematical equations, tables, and parameters needed to
>implement the algorithm.
> B.2 Software implementation and source code, in ANSI C code, which
>will compile on a personal computer. This code will be used to compare
>software performance and memory requirements with respect to other
>algorithms.
> B.3 Statement of estimated computational efficiency in hardware
>and software.
> B.4 Encryption example mapping a specified plaintext value into
>ciphertext.
> B.5 Statement of licensing requirements and patents which may be
>infringed by implementations of this algorithm.
> B.6 An analysis of the algorithm with respect to known attacks.
> B.7 Statement of advantages and limitations of the submitted
>algorithm."
>
>
Return to February 1997
Return to ““Mullen, Patrick” <Patrick.Mullen@GSC.GTE.Com>”
1997-02-19 (Wed, 19 Feb 1997 07:48:10 -0800 (PST)) - FW: Rules for The Great DES Replacement Contest - “Mullen, Patrick” <Patrick.Mullen@GSC.GTE.Com>