[PATCH] Configure.help updates for AES.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



Hi!

Subject says it all. Please check and consider applying.

Marc

-- 
Marc Mutz <Marc@xxxxxxxx>     http://EncryptionHOWTO.sourceforge.net/
University of Bielefeld, Dep. of Mathematics / Dep. of Physics

PGP-keyID's:   0xd46ce9ab (RSA), 0x7ae55b9e (DSS/DH)
--- Configure.help~	Tue Oct  3 20:03:06 2000
+++ Configure.help	Wed Oct  4 15:28:53 2000
@@ -365,6 +365,54 @@
 
   If unsure, say 'N'.
 
+AES cipher (EXPERIMENTAL - Read Help)
+CONFIG_CIPHER_AES
+  [2000-10-04]
+  DESCRIPTION:
+  AES (Advanced Encryption Standard) is a proposed Federal Information
+  Processing Standard (FIPS) of the USA. Nevertheless, it was
+  conceived by Joan Daemon and Vincent Rijmen, two Belgians, under the
+  name Rijndael and submitted to the AES selection process in 1997
+  (http://www.nist.gov/aes). On Oct 2, 2000 it was announced as being
+  the selected algorithm for the AES.
+
+  Rijndael is a variable-round iterated block cipher that supports
+  block and key sizes each ranging from 128 to 256 bits, in steps of
+  64. The number of rounds is dependant on the block and key sizes and
+  varies from 10 for 128/128 to 14 for 256/256 block/key sizes.
+  
+  SPPED: N/A
+
+  PATENTS and LICENSING:
+  Rijndeal/AES is free of patents. As beign AES, NIST will ensure that
+  this will stay so.
+
+  KNOWN ATTACKS:
+  None of the following attacks is able to undermine the security of
+  AES, when used with the round numbers specified by the authors.
+
+  The original Rijndael specification contains a truncated
+  differential attack on 4,5 resp. 6 round versions ("Square attack")
+  requiring 2^9, 2^11 resp. 2^32 plaintexts and 2^9, 2^40 resp. 2^72
+  work. There is another truncated differential attack that leads to a
+  collision attack on 7 round 192 and 256 bit keysize Rijndael
+  requiring 2^32 plaintext encryptions and 2^140 work. Other authors
+  extend the original Square attack to 7 rounds of 192 and 256 bit
+  keysize, both with more that 2^184 work. Further improvements of
+  these techniques result in attacks against 7 and 8 round
+  variants. But the latter require almost all of the codebook. At
+  last, there is a related key attack against 9 round, 256 bit keysize
+  Rijndael that requires 2^77 chosen plaintexts and 2^224 work.
+
+AES available under the Rijndael name
+CONFIG_CIPHER_RIJNDAEL
+  If you say 'Y' here, AES will be also accessible through its
+  original name Rijndael. This is mostly for backwards compatibilty.
+  If you use kernel modules that use Rijndael, but do not know that it
+  is now called AES, say 'Y' here.
+
+  If unsure, say 'N'.
+
 DFC encryption (EXPERIMENTAL - Read Help)
 CONFIG_CIPHER_DFC
   [2000-09-13]
@@ -390,7 +438,7 @@
 CONFIG_CIPHER_MARS
   [2000-09-13]
   DESCRIPTION:
-  MARS is IBM's candidate algorithm for the Advanded Encryption
+  MARS was IBM's candidate algorithm for the Advanded Encryption
   Standard (AES). It consists of 16 core rounds and eight pre-mixing
   as well as eight post-mixing rounds.
 
@@ -417,7 +465,7 @@
 CONFIG_CIPHER_RC6
   [2000-09-13]
   DESCRIPTION:
-  RC6 is invented by Ron Rivest and RSA Labs.  It is one of the five
+  RC6 is invented by Ron Rivest and RSA Labs.  It was one of the five
   candidates in round two for the Advanced Encryption Standard (AES).
 
   PATENTS and LICENSING:
@@ -446,7 +494,7 @@
   DESCRIPTION:
   Serpent is a 128-bit block cipher designed by Ross Anderson, Eli
   Biham and Lars Knudsen as a candidate for the Advanced Encryption
-  Standard (AES, see http://www.nist.gov/aes).  It is one of the five
+  Standard (AES, see http://www.nist.gov/aes).  It was one of the five
   finalists after round two of the AES candidate search. Serpent
   provides users with the highest practical level of assurance that no
   shortcut attack will be found.  To achieve this, the algorithm uses

[Index of Archives]     [Kernel]     [Linux Crypto]     [Gnu Crypto]     [Gnu Classpath]     [Netfilter]     [Bugtraq]
  Powered by Linux