10 September 1997
Source:
http://csrc.ncsl.nist.gov/encryption/aes/aes_9709.htm
Thanks to Bill Stewart for forwarding Jim Foti's (ncsl.nist.gov) notice of
this announcement. This is expected to be published in the Federal Register
on Friday, September 12.
AGENCY: National Institute of Standards and Technology (NIST), Commerce.
ACTION: Notice; Request for candidate encryption algorithm nomination packages
SUMMARY: A process to develop a Federal Information Processing Standard (FIPS) for Advanced Encryption Standard (AES) specifying an Advanced Encryption Algorithm (AEA) has been initiated by the National Institute of Standards and Technology (NIST). This notice requests submissions of candidate algorithms for consideration for inclusion in the AES and specifies how to submit a nomination package. The requirements for candidate algorithm submission packages and minimum acceptability requirements that must be satisfied in order to be deemed a complete and proper submission are presented. The evaluation criteria which will be used to appraise the candidate algorithms are also described.
It is intended that the AES will specify an unclassified, publicly disclosed encryption algorithm available royalty-free worldwide that is capable of protecting sensitive government information well into the next century.
The purpose of this notice is to solicit candidate algorithms from the public, academic/research communities, manufacturers, voluntary standards organizations, and Federal, state, and local government organizations. Following the close of the submission period, NIST intends to make all submissions publicly available for review and comment.
DATES: Submission deadline: candidate algorithm nomination packages must be received by June 15, 1998.
Submission packages received before April 15, 1998 will be reviewed for completeness by NIST and notified of their specific deficiencies, if any, by May 15, 1998, allowing time for deficient packages to be amended by the submission deadline.
No amendments to deficient packages will be permitted after the submission
deadline. Requests for withdrawal of candidate algorithm submission
packages previously submitted will only be honored until the submission deadline.
ADDRESS: Candidate algorithm submission packages should be sent to Director, Information Technology Laboratory, Attn: Advanced Encryption Standard Nominations, Technology Building, Room A231, National Institute of Standards and Technology, Gaithersburg, MD 20899.
FOR FURTHER INFORMATION CONTACT: For general information, contact: Edward Roback, National Institute of Standards and Technology, Building 820, Room 426, Gaithersburg, MD 20899; telephone 301-975-3696 or via fax at 301-948-1233.
If necessary, general questions for clarification of these requirements for candidate algorithm submission packages, minimum acceptability requirements, or evaluation criteria/process should be sent electronically to AESQUEST@NIST.GOV or via fax to 301-948-1233 (Attn: AES Questions). In fairness to all parties, answers to germane questions will be made publicly available simultaneously to all those interested at <http://csrc.nist.gov/encryption/aes/aes_home.htm>. Non-pertinent questions may be ignored.
Technical questions and questions related to a specific submission package may be made by contacting either Miles Smid at (301) 975-2938, or Jim Foti at (301) 975-5237.
NIST will endeavor to answer all questions in a timely manner.
SUPPLEMENTARY INFORMATION:
This section contains the following:
1. Background
2. Requirements for Candidate Algorithm Submission
Packages
3. Minimum Acceptability Requirements
4. Evaluation Criteria
5. First AES Conference
6. Plans for Candidate Evaluation Process
This work effort is being initiated pursuant to NIST's responsibilities under the Computer Security Act of 1987, the Information Technology Management Reform Act of 1996, Executive Order 13011, and OMB Circular A-130.
NIST recognizes that many institutions, both within and outside the Federal Government, have considerable investments in their current installed base of encryption equipment implementing the Data Encryption Algorithm, specified in the Data Encryption Standard (DES, Federal Information Processing Standard 46-2). DES was first approved in 1977 and was most recently reaffirmed by the Secretary in 1993, until December 1998. In 1993 the following statement was included in the standard:
"At the next review (1998), the algorithm specified in this standard will be over twenty years old. NIST will consider alternatives which offer a higher level of security. One of these alternatives may be proposed as a replacement standard at the 1998 review."
It is NIST's view that a multi-year transition period will be necessary to move toward any new encryption standard and that DES will continue to be of sufficient strength for many applications. NIST will consult with all interested parties so that a smooth transition can be accomplished. NIST may not complete the AES selection process before the end of its 1998 DES Review, and an interim solution(s) may be necessary.
For interoperability and other purposes, NIST strongly desires to select
a single block encryption algorithm to be specified in the AES with a strength
equal to or better than that of Triple DES and significantly improved
efficiency. However, if more than one suitable candidate is identified
which provides significantly better advantages in a specific application(s),
NIST may consider recommending more than one algorithm. Present resource
constraints do not permit the development of a specific standard algorithm
for 8-bit smart card implementations or a standard stream cipher. It
is hoped that the block cipher selected will be suitably flexible for a wide
variety of implementations, recognizing that it may not operate with optimal
efficiency in each and every potential application.
To be considered as a complete nomination package (and continue further in the AES consideration process), candidate algorithm submission packages MUST contain the following (as described in detail below):
Each of these is discussed in detail below, including general
submission requirements which all nominations must also satisfy.
A cover sheet containing the following information:
2.B.1 A complete written specification of the algorithm shall be included, consisting of all necessary mathematical equations, tables, diagrams, and parameters that are needed to implement the algorithm. The submission of all design rationale (e.g., method for generating table values, rationale for number of rounds, etc.) is strongly encouraged, in order to facilitate the public evaluation process.
Parity bits shall not be specified in the key definition. The bit naming/numbering convention for the key shall be provided by the submitter.
2.B.2 A statement of the algorithms estimated computational efficiency in hardware and software shall be included. At a minimum, the submitter shall state efficiency estimates for the NIST AES analysis platform (specified elsewhere in section 6.B) and for 8-bit processors. (Efficiency estimates for other platforms may be included at the submitters discretion.) These estimates shall each include the following information, at a minimum:
shall be specified for each key- and block-size combination required in the Minimum Acceptability Requirements section of this announcement.
2.B.3 A series of Known Answer Tests (KATs) and Monte Carlo Tests (MCTs) shall be included as specified below. All of these KAT and MCT values shall be submitted electronically, in separate files, on a diskette as described in section 2.C.3. (The files containing test values may be compressed using PKZIP or GNUZIP to conserve disk space.) Each file shall be clearly labeled with header information listing:
All values within the file shall be clearly labeled (e.g., index, key, plaintext, ciphertext, etc.), and shall be in the exact format specified by NIST on its WWW site at <http://csrc.nist.gov/encryption/aes/aes_home.htm>.
Note: The submitter may include any other known answer tests that exercise different features of the algorithm (e.g., for permutation tables, etc.). The purposes of these tests shall be clearly described in the file containing the test values.
A link to a description of the required tests will be available at <http://csrc.nist.gov/encryption/aes/aes_home.htm>. Required submission data for the Monte Carlo Tests will also be found at that location.
2.B.4 A statement of the expected strength (i.e., workfactor) of the algorithm shall be included, along with any supporting rationale. The expected strength shall be given for each key- and block-size combination required in the Minimum Acceptability Requirements section of this announcement, and for all other key- and block-size combinations claimed to be supported by the algorithm.
2.B.5 An analysis of the algorithm with respect to known attacks (e.g., known and chosen plaintext) shall be included. In addition, all known weak keys, equivalent keys, complementation properties, restrictions on key selection, and other similar features of the algorithm shall be noted by the submitter. If no such values are known, then this shall be stated by the submitter.
The submitter should provide any mathematical rationale for the non-existence of trap-doors in the algorithm, to the greatest extent possible.
The submitter shall provide a list of known references to any published materials describing or analyzing the security of the submitted algorithm. Submission of copies of these materials (accompanied by a waiver of copyright or permission from the copyright holder for AES public evaluation purposes) is encouraged.
2.B.6 A statement shall be included that lists and describes advantages and limitations of the algorithm. Such advantages and limitations shall address the ability to:
If the submitter believes that the algorithm has certain features deemed
advantageous by the submitter, then these should be listed and described,
along with supporting rationale. Some examples of these features might
include, for example: throw-away tables, mathematically (rather than empirically)
designed tables, statistical basis for inter-round mixing, variable key setup
time, etc.
A reference implementation shall be submitted, in order to promote the understanding of how the candidate algorithm may be implemented. This implementation shall consist of source code written in ANSI C; appropriate comments should be included in the code, and it should clearly map to the algorithm description included under section 2.B.1. Since this implementation is intended for reference purposes, clarity in programming is more important than efficiency.
The reference implementation shall be capable of fully demonstrating the operation of the candidate algorithm. The reference implementation shall support all key- and block-size combinations specified in the Minimum Acceptability Requirements section of this announcement. Additionally, it must support all other key-block sizes that are claimed to be supported by the algorithm.
NIST will specify a cryptographic API for the ANSI C implementations, which will be made available at <http://csrc.nist.gov/encryption/aes/aes_home.htm>. All ANSI C submissions shall implement that API, so that the NIST test system can be compatible with all submissions.
Separate source code for implementing the required Known Answer Tests and Modes Tests with the reference implementation shall also be included. This code shall be able to process input specified in the format indicated by NIST (on the WWW site as referred to under section 2.B.3) and run the required tests.
The reference implementation shall be provided on a single diskette, which
shall be labeled with the submitters name, the algorithm name, and
Reference Implementation.
Two mathematically optimized implementations of the candidate algorithm
shall be submitted, so that NIST can perform tests in two different languages
in order to demonstrate the potential for efficient implementation.
These two implementations shall be specified in ANSI C and Java programming
languages:
NIST will specify a cryptographic API for the ANSI C implementations, which
will be made available at
<http://csrc.nist.gov/encryption/aes/aes_home.htm>.
All ANSI C submissions shall implement that API, so that the NIST test system
can be compatible with all submissions.
Submissions are required to use the cryptographic API defined by the Java Cryptography Architecture (JCA) in conjunction with the Java Cryptography Extension (JCE). An AES submitter shall create a Cryptography Package Provider (CPP) that implements the submitted candidate algorithm. The Provider class is described in the JCA (Refer to <http://java.sun.com:80/products/jdk/1.1/docs/guide/security/CryptoSpec.html>, under The Provider Class; JCE 1.1 APIs may be found at <http://java.sun.com/security>). The Cipher engine subclass within the CPP (as defined in the JCE) shall then be used to implement the candidate encryption algorithm. Other appropriate engine subclasses from the JCA and JCE may also be implemented, to accomodate features of the particular candidate algorithm (e.g., Key Generator class in the JCE).
General Requirements for Both Mathematically Optimized
Implementations
The files on this diskette shall contain all of the test values required under section 2.B.3 of this announcement. That section includes descriptions of the required tests as well as a list of the values that must be provided. These files may be compressed using PKZIP or GNUZIP to conserve disk space, if necessary.
The required format for the test vectors will be specified by NIST at <http://csrc.nist.gov/encryption/aes/aes_home.htm>.
The test values shall be provided on a single diskette, which shall be labeled
with the submitters name, the algorithm name, and Test Values:
Known Answer Tests and Monte Carlo Tests.
So as to facilitate electronic distribution of submissions to all interested parties, copies of all written materials must also be submitted in electronic form in either PostScript or Adobe PDF. PDF is preferable. (NIST will convert PostScript submissions to PDF.) Submitters planning to create PDF are encouraged to use the thumbnail and bookmark features, to have a clickable table of contents (if applicable), and to include other links within the PDF as appropriate. To create a PostScript file, users of PC word processors should configure their software to print using a PostScript printer driver, and capture the output using the print to file feature, preferably using standard PostScript printer fonts (not downloaded fonts).
Users of TeX, LaTeX/DVIPS should use PostScript Type 1 fonts, preferably
standard PostScript printer fonts, rather than the default embedded bitmapped
Computer Modern fonts. Instructions for configuring DVIPS can
be found at
<http://www.adobe.com/supportservice/custsupport/SOLUTIONS/385e.htm>
, "Creating quality Adobe PDF files from TeX with DVIPS, by Kendall
Whitehouse/EMERGE, FaxYI number 131303. (This is cited for reference
purposes only, and does not constitute a direct or implied endorsement.)
NIST then intends to make submissions available electronically (consistent with U.S. export regulations) in both PostScript and PDF formats.
This electronic version of the supporting documentation shall be provided
on diskette(s), which shall be labeled with the submitters name, the
algorithm name, and Supporting Documentation. If multiple
diskettes are necessary, each diskette must also be labeled with #
m of n as appropriate.
A separate diskette shall be used for the reference implementation, mathematically optimized implementations, test values, and supporting materials.
All magnetic media presented to NIST shall be free of viruses or other malicious code. Media submitted will be scanned for the presence of such code. If such malicious code is found, NIST will notify the submitter and ask that a clean version of the magnetic media be re-submitted.
All magnetic media shall be submitted on 3.5" 1.44MB floppy diskettes, formatted for use on an IBM-compatible PC.
A file labeled README shall be included on each diskette, listing all files included on the diskette, with a brief description of each.
NIST is in the process of defining a selected set of cryptographic service
calls for the ANSI C implementations. For the Java implementation,
NIST will use calls from the Java Cryptography Architecture API. These
two sets of calls shall be used by the NIST test software to make appropriate
calls to the optimized and reference implementations, so that the test software
does not have to be rewritten for each submitted algorithm. Therefore,
both the mathematically optimized and reference implementations are
required to conform with these specific calls. The implementations
shall be supplied in source code so that NIST can compile and link them
appropriately with the test software. The two selected sets of required
calls will be available at the following location:
<http://csrc.nist.gov/encryption/aes/aes_home.htm>.
NIST intends that these will be available within three months after publication
of this notice.
After review of the public comments on the draft minimum acceptability requirements and evaluation criteria (published for comment in the Federal Register on January 2, 1997), NIST has determined that potential users of the AES desire to have the AES available worldwide on a royalty free basis. Additionally, based upon the results of the April 15, 1997 public workshop held on the draft evaluation criteria and submission requirements, NIST believes there is a reasonable basis to expect a sufficient number and variety of submissions willing to meet these licensing conditions such that the expressed needs of potential AES users can be accommodated.
In order to ensure this and minimize any intellectual property issues, the
following statement is required:
I, _____ (print submitters full name) ____ do hereby declare that to the best of my knowledge the practice of the algorithm, reference implementation, and mathematically optimized implementations, I have submitted, known as ____ (print name of algorithm)____ may be covered by the following U.S. and/or foreign patents: _____ (describe and enumerate or state none if appropriate)_____ .
I do hereby declare that I am aware of no patent applications which may cover the practice of my submitted algorithm, reference implementation or mathematically optimized implementations. OR I do hereby declare that the following pending patent applications may cover the practice of my submitted algorithm, reference implementation or mathematically optimized implementations: _____ (describe and enumerate) ______ .
I do hereby understand that my submitted algorithm may not be selected for inclusion in the Advanced Encryption Standard. I also understand and agree that after the close of the submission period, my submission may not be withdrawn from public consideration for inclusion in the Federal Information Processing Standard (FIPS) for Advanced Encryption Standard (AES). I further understand that I will not receive financial compensation from the government for my submission. I certify that, to the best of my knowledge, I have fully disclosed all patents and patent applications relating to my algorithm. I also understand that the U.S. Government may, during the course of the lifetime of the AES or during the FIPS public review process, modify the algorithms specifications (e.g., to protect against a newly discovered vulnerability). Should my submission be selected for inclusion in the AES, I hereby agree not to place any restrictions on the use of the algorithm intending it to be available on a worldwide, non-exclusive, royalty-free basis.
I do hereby agree to provide the statements required by sections 2.D.2 and 2.D.3, below, for any patent or patent application identified to cover practice of my algorithm, reference implementation or mathematically optimized implementations and the right to use such implementations for the purposes of the AES evaluation process.
I understand that NIST will announce the selected algorithm(s) and proceed to publish the draft FIPS for public comment. If my algorithm (or the derived algorithm) is not selected for inclusion in the FIPS (including those not selected for second round of public evaluation), I understand that all rights, including use rights of the reference and mathematically optimized implementations, revert back to the submitter (and other owner[s] as appropriate). Additionally, should the U.S. Government not select my algorithm for inclusion in the AES after a period of four years from the close of the submission date for candidate algorithms, all rights revert to the submitter (and other owner[s] as appropriate).
Signed:
Title:
Dated:
Place:
If there are any patents (or patent applications) identified by the submitter, including those held by the submitter, the following statement must be signed by each and every owner of the patent and patent applications above identified.
I, ____ (print full name) ____ , of _____(print full postal address)______
, am the owner or authorized representative of the owner (print full name,
if different than the signer) of the following patent(s) and or patent
application(s): ______ (enumerate) ______ , and do hereby agree
to grant to any interested party if the algorithm known as _____(print name
of algorithm) _______ , is selected for inclusion in the Advanced Encryption
Standard, an irrevocable nonexclusive royalty-free license to practice the
referenced algorithm, reference implementation or the mathematically optimized
implementations. Furthermore, I agree to grant the same rights in any
other patent granted to me or my company which may be necessary for the practice
of the referenced algorithm, reference implementation, or the mathematically
optimized implementations.
Signed:
Title:
Dated:
Place:
Note that the government may conduct research as may be appropriate to verify
the availability of the submission on a royalty free basis worldwide.
The following must also be included:
I, _____(print full name)_______, am the owner of the submitted reference implementation and mathematically optimized implementations and hereby grant the Government and any interested party the right to use such implementations for the purposes of the AES evaluation process notwithstanding that the implementations may be copyrighted.
Signed:
Title:
Dated:
Place:
NIST welcomes both domestic and international submissions; however, in order to facilitate analysis and evaluation, it is required that the submission packages be in English. This information includes the cover sheet, algorithm specification and supporting documentation, source code, and intellectual property information. Any required information that is submitted in a language other than English shall render the submission package incomplete. Optional supporting materials (e.g., journal articles) in another language may be submitted.
Classified and/or proprietary submissions shall not be accepted.
Those packages which are deemed to be complete will then be evaluated to see if they contain a proper candidate algorithm. To be considered as a proper candidate algorithm submission (and continue further in the AES Development Process), candidate algorithms must meet the following minimum acceptability requirements:
(End of minimum acceptability requirements)
Candidate algorithm submission packages which are complete (as defined earlier)
and whose algorithm meets the minimum acceptability requirements (as defined
immediately above) will be deemed to be complete and proper
submissions. Those deemed otherwise will receive no further
consideration. A complete list of submissions will be publicly announced
by NIST - those which are complete and proper, and any others.
In order to provide a basis for the analysis and evaluation of encryption algorithms submitted to be considered for incorporation into the FIPS for AES, evaluation criteria will be used to review candidate algorithms. All of NISTs analysis results will be made publicly available.
Although NIST will be performing its own analyses of the candidate algorithms, NIST strongly encourages public evaluation, making those results publicly available and submitting them to NIST. This information may be addressed at the Second and Third AES Candidate Conferences. NIST will take into account its own analysis, as well as all other input received, in order to make its decision regarding the AES selection.
Candidate algorithms with submission packages deemed to be complete
and proper will be compared based on the following factors (ranked
in the order of relative importance):
SECURITY (i.e., the effort required to cryptanalyze):
The security provided by an algorithm is the most important factor in the evaluation.
Algorithms will be judged on the following factors:
Claimed attacks will be evaluated for practicality.
COST
Computational efficiency essentially refers to the speed of the algorithm.
NISTs analysis of computational efficiency will be made using each
submissions mathematically optimized implementations on the platform
specified under Round 1 Technical Evaluation below.
Public comments on each algorithms efficiency (particularly for various
platforms and applications) will also be taken into consideration by
NIST.
Memory requirements will include such factors as gate counts for hardware implementations, and code size and RAM requirements for software implementations.
Testing will be performed by NIST using the mathematically optimized implementations provided in the submission package. Memory requirement estimates (for different platforms and environments) that are included in the submission package will also be taken into consideration by NIST. Input from public evaluations of each algorithms memory requirements (particularly for various platforms and applications) will also be taken into consideration by NIST.
Algorithm and Implementation
Characteristics
Some examples of flexibility may include (but are not limited to) the following:
An open public conference is being planned for the summer of 1998, at which the submitter of each complete and proper nomination package is invited to publicly discuss and explain their candidate algorithm.
Written portions of all submitted candidates will be made available at the Conference, including those not deemed complete and proper. Submitters of complete and proper submissions will be invited to speak to discuss their submission and answer questions.
As details and registration procedures are finalized, they will be posted
to
<http://csrc.nist.gov/encryption/aes/aes_home.htm>.
This section provides an overview of the envisioned AES candidate review
process, including NISTs plans for technical analysis of submissions.
Following the close of the call for candidate algorithm submission packages, NIST will review them to determine which are complete and proper, as described elsewhere in this notice. NIST then intends to make all submissions publicly available (consistent with U.S. export regulations) and invite public comments on the complete and proper submissions. To help better inform the public, the First AES Candidate Conference will be held at the start of the public comment process to allow submitters to publicly explain and answer questions regarding their submissions. NIST intends to publish a separate Federal Register notice in the future requesting public comments on the candidate algorithms in the Round 1 evaluation to be used in narrowing of the candidate pool for more careful study and analysis in Round 2.
During the Round 1 public review, NIST intends to technically evaluate the candidate algorithms as outlined in the Round 1 Technical Evaluation section below. Note that NIST does not intend to conduct its own cryptanalysis, but, rather it will review the public evaluations of the candidate algorithms cryptographic strengths and weaknesses, and NIST will use these in determining if an algorithm meets the objectives of the AES. Because of limited resources, and also to avoid moving evaluation targets (i.e., modifying the submitted algorithms undergoing public review), NIST will not accept modifications to the submitted algorithms during Round 1.
For informational and planning purposes, near the end of the Round 1 public evaluation process, NIST intends to hold the Second AES Candidate Conference (approximately six months after the first conference; exact date to be scheduled.) Its purpose will be to publicly discuss the AEA candidate algorithms by NIST and others, and provide NIST with advice for narrowing the field of algorithms to be considered for the AEA.
NIST thereafter intends to narrow the field of candidates to no more than five candidate algorithms based upon its own analysis, public comment, and all other available information. It is envisioned that this narrowing will be done primarily on security, efficiency, and intellectual property considerations.
Before the start of Round 2 evaluation, submitters have the option of providing updated mathematically optimized implementations for use during the second phase of evaluation (for those algorithms remaining in the Round 2 evaluation). During the course of Round 1 evaluations it is conceivable that some small deficiencies may be identified in even some of the most promising candidates. Therefore, for the Round 2 evaluations, small modifications to the submitted algorithms will be permitted for either security or efficiency purposes. Submitters may submit minor changes (no substantial redesigns) along with a supporting explanation/justification (see below) which must be received by NIST prior to the beginning of Round 2. (Submitters will be notified by NIST of the exact deadline.) If this option is exercised, new reference and mathematically optimized implementations and written descriptions must also be provided by the start of Round 2. This will allow public review of the modified algorithms during the entire course of the second evaluation.
Note: All proposed changes for Round 2 must be proposed by the submitter; no proposed changes (to the algorithm or implementations) will be accepted from a third party.
After the narrowed list of candidate algorithms is officially announced, NIST intends that a six to nine month public review period will follow (the Round 2 evaluation). During the public review, NIST intends to technically evaluate the candidate algorithms as outlined in the two sections below. Near the end of the public review period, NIST intends to hold the Third AES Candidate Conference. (The exact date is to be scheduled.)
NIST then will select the algorithm(s) for inclusion in the AES, which will be incorporated into a draft FIPS, which NIST intends to announce in the Federal Register for comment.
Note that this schedule for the AES development is somewhat tentative, depending
in part upon the type, quantity, and quality of submissions. Specific
conference dates and public comment periods will be announced at appropriate
times in the future. Note also that as a result of comments received
on the draft evaluation criteria and submission requirements, NIST has further
extended the length of time for algorithm submissions and each of the ensuing
planned public comment periods.
NIST will invite public comments on all complete and proper submissions. NISTs Round 1 analysis is intended, at a minimum, to be performed as follows:
NIST may perform efficiency testing on other platforms.
The above tests will be performed by NIST with the following tools, at a minimum. Due to limited resources, NIST has limited its own efficiency analysis to a single, common platform; however, NIST invites the public to conduct similar tests and compare results on additional platforms (e.g., RISC processors, 8-bit processors, Digital Signal Processors, dedicated CMOS, etc.).
Note: any changes to the intended platform/compiler will be noted on
<http://csrc.nist.gov/encryption/aes/aes_home.htm>.
At the end of the Round 1 Technical evaluation and the Second AES Candidate Conference, NIST intends to narrow the field of candidate algorithms to five or fewer, in order to focus the remaining efforts of both NIST and the public. Once again, NIST intends to perform its own analysis of the submissions, and make that information publicly available. NISTs Round 2 analysis will, at a minimum, be performed as follows. Note: the same platform and compilers from Round 1 will be used for the Round 2.
NIST will welcome comments regarding the efficiency of the candidate algorithms when implemented in hardware. NIST may pursue having the remaining algorithms specified using a Hardware Description Language, to compare the estimated hardware efficiency of the candidate algorithms.
NIST may perform efficiency testing using additional platforms. Once
again, NIST welcomes public input regarding efficiency testing on additional
platforms.
This section is intended to address some of the questions/comments raised
in the review of the draft evaluation criteria.
Appreciation
NIST extends its appreciation to all submitters and those providing public
comments during the AES development process.
Elaine Bunten-Mines, Director, Program Office
______________________________________
Date