Donate for the Cryptome archive of files from June 1996 to the present

16 March 2014

CAESAR Submissions Published


Date: 17 Mar 2014 00:00:36 -0000
From: "D. J. Bernstein" <djb[at]cr.yp.to>
To: crypto-competitions[at]googlegroups.com
Subject: CAESAR round 1

I've now posted all 56 CAESAR submissions (1510 pages of PDFs from 136 designers, or 187 counted with multiplicity):

http://competitions.cr.yp.to/caesar-submissions.html

Most of the submissions meet the requirements of the call for submissions. Some don't, giving the CAESAR secretary the option to eliminate the submissions. In a few cases the violations are so severe that this option should probably be exercised, but I've decided to give the submitters a brief opportunity to fix their PDFs (without switching to different ciphers). In particular, don't be surprised for now if you notice a few underspecified ciphers.

---Dan


Date: 17 Mar 2014 00:28:58 -0000
From: "D. J. Bernstein" <djb[at]cr.yp.to>
To: crypto-competitions[at]googlegroups.com
Subject: reduced-round AES

Quite a few of the submissions are "mode" submissions that advertise proofs of security, often starting from the assumption that AES is secure. In most of these cases it should be safe to replace AES with reduced-round AES, but the minimum safe number of rounds will vary from one mode to another. So here's a challenge for cryptanalysts: figure out how many rounds of AES-GCM, AES-COPA, etc. you can actually break.

Everyone knows that reduced-round cryptanalysis is the right way to understand primitives such as AES, and I'm sure we'll see reduced-round cryptanalysis of many of the non-"mode" submissions; but I've seen very little literature on reduced-round cryptanalysis of, e.g., AES-CTR or AES-CBC, never mind authenticated ciphers such as AES-GCM. I would guess that AES-CBC needs at least two more rounds than AES-CTR to be secure.

---Dan

_____

Visit this group at http://groups.google.com/group/crypto-competitions