5.1. Evaluation Criteria For AES
The Origins of AES
We mentioned in Chapter
3 that in 1999, NIST issued a new version of its DES standard (FIPS PUB
46-3) that indicated that DES should only be used for legacy systems and that
triple DES (3DES) be used. We describe 3DES in Chapter 6. 3DES has two attractions that assure its
widespread use over the next few years. First, with its 168-bit key length, it
overcomes the vulnerability to brute-force attack of DES. Second, the underlying
encryption algorithm in 3DES is the same as in DES. This algorithm has been
subjected to more scrutiny than any other encryption algorithm over a longer
period of time, and no effective cryptanalytic attack based on the algorithm
rather than brute force has been found. Accordingly, there is a high level of
confidence that 3DES is very resistant to cryptanalysis. If security were the
only consideration, then 3DES would be an appropriate choice for a standardized
encryption algorithm for decades to come.
The principal drawback of 3DES is that the algorithm is
relatively sluggish in software. The original DES was designed for mid-1970s
hardware implementation and does not produce efficient software code. 3DES,
which has three times as many rounds as DES, is correspondingly slower. A
secondary drawback is that both DES and 3DES use a 64-bit block size. For
reasons of both efficiency and security, a larger block size is desirable.
Because of these drawbacks, 3DES is not a reasonable candidate
for long-term use. As a replacement, NIST in 1997 issued a call for proposals
for a new Advanced Encryption Standard (AES), which should have a security
strength equal to or better than 3DES and significantly improved efficiency. In
addition to these general requirements, NIST specified that AES must be a
symmetric block cipher with a block length of 128 bits and support for key
lengths of 128, 192, and 256 bits.
In a first round of evaluation, 15 proposed algorithms were
accepted. A second round narrowed the field to 5 algorithms. NIST completed its
evaluation process and published a final standard (FIPS PUB 197) in November of
2001. NIST selected Rijndael as the proposed AES algorithm. The two
researchers who developed and submitted Rijndael for the AES are both
cryptographers from Belgium: Dr. Joan Daemen and Dr. Vincent Rijmen.
Ultimately, AES is intended to replace 3DES, but this process
will take a number of years. NIST anticipates that 3DES will remain an approved
algorithm (for U.S. government use) for the foreseeable future.
AES Evaluation
It is worth examining the criteria used by NIST to evaluate
potential candidates. These criteria span the range of concerns for the
practical application of modern symmetric block ciphers. In fact, two set of
criteria evolved. When NIST issued its original request for candidate algorithm
nominations in 1997 [NIST97], the request stated that
candidate algorithms would be compared based on the factors shown in Table 5.1 (ranked in descending order of
relative importance). The three categories of criteria were as follows:
-
Security: This refers to the effort required to cryptanalyze an algorithm. The emphasis in the evaluation was on the practicality of the attack. Because the minimum key size for AES is 128 bits, brute-force attacks with current and projected technology were considered impractical. Therefore, the emphasis, with respect to this point, is cryptanalysis other than a brute-force attack.
-
Cost: NIST intends AES to be practical in a wide range of applications. Accordingly, AES must have high computational efficiency, so as to be usable in high-speed applications, such as broadband links.
[Page 137] -
Algorithm and implementation characteristics: This category includes a variety of considerations, including flexibility; suitability for a variety of hardware and software implementations; and simplicity, which will make an analysis of security more straightforward.
5.1. Evaluation Criteria For AES
The Origins of AES
We mentioned in Chapter 3 that in 1999, NIST issued a new version of its DES standard (FIPS PUB 46-3) that indicated that DES should only be used for legacy systems and that triple DES (3DES) be used. We describe 3DES in Chapter 6. 3DES has two attractions that assure its widespread use over the next few years. First, with its 168-bit key length, it overcomes the vulnerability to brute-force attack of DES. Second, the underlying encryption algorithm in 3DES is the same as in DES. This algorithm has been subjected to more scrutiny than any other encryption algorithm over a longer period of time, and no effective cryptanalytic attack based on the algorithm rather than brute force has been found. Accordingly, there is a high level of confidence that 3DES is very resistant to cryptanalysis. If security were the only consideration, then 3DES would be an appropriate choice for a standardized encryption algorithm for decades to come.
[Page 136] The principal drawback of 3DES is that the algorithm is relatively sluggish in software. The original DES was designed for mid-1970s hardware implementation and does not produce efficient software code. 3DES, which has three times as many rounds as DES, is correspondingly slower. A secondary drawback is that both DES and 3DES use a 64-bit block size. For reasons of both efficiency and security, a larger block size is desirable.Because of these drawbacks, 3DES is not a reasonable candidate for long-term use. As a replacement, NIST in 1997 issued a call for proposals for a new Advanced Encryption Standard (AES), which should have a security strength equal to or better than 3DES and significantly improved efficiency. In addition to these general requirements, NIST specified that AES must be a symmetric block cipher with a block length of 128 bits and support for key lengths of 128, 192, and 256 bits.In a first round of evaluation, 15 proposed algorithms were accepted. A second round narrowed the field to 5 algorithms. NIST completed its evaluation process and published a final standard (FIPS PUB 197) in November of 2001. NIST selected Rijndael as the proposed AES algorithm. The two researchers who developed and submitted Rijndael for the AES are both cryptographers from Belgium: Dr. Joan Daemen and Dr. Vincent Rijmen.Ultimately, AES is intended to replace 3DES, but this process will take a number of years. NIST anticipates that 3DES will remain an approved algorithm (for U.S. government use) for the foreseeable future.AES Evaluation
It is worth examining the criteria used by NIST to evaluate potential candidates. These criteria span the range of concerns for the practical application of modern symmetric block ciphers. In fact, two set of criteria evolved. When NIST issued its original request for candidate algorithm nominations in 1997 [NIST97], the request stated that candidate algorithms would be compared based on the factors shown in Table 5.1 (ranked in descending order of relative importance). The three categories of criteria were as follows:-
Security: This refers to the effort required to cryptanalyze an algorithm. The emphasis in the evaluation was on the practicality of the attack. Because the minimum key size for AES is 128 bits, brute-force attacks with current and projected technology were considered impractical. Therefore, the emphasis, with respect to this point, is cryptanalysis other than a brute-force attack.
-
Cost: NIST intends AES to be practical in a wide range of applications. Accordingly, AES must have high computational efficiency, so as to be usable in high-speed applications, such as broadband links.
[Page 137] -
Algorithm and implementation characteristics: This category includes a variety of considerations, including flexibility; suitability for a variety of hardware and software implementations; and simplicity, which will make an analysis of security more straightforward.
-
No comments:
Post a Comment