NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a
Europe
Europe is a continent located entirely in the Northern Hemisphere and mostly in the Eastern Hemisphere. It is bordered by the Arctic Ocean to the north, the Atlantic Ocean to the west, the Mediterranean Sea to the south, and Asia to the east ...
an research project funded from 2000 to 2003 to identify secure
cryptographic
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
primitives. The project was comparable to the
NIST
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
AES process and the Japanese Government-sponsored
CRYPTREC
CRYPTREC is the Cryptography Research and Evaluation Committees set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use. It is comparable in many respects to the European Union's NESSI ...
project, but with notable differences from both. In particular, there is both overlap and disagreement between the selections and recommendations from NESSIE and CRYPTREC (as of the August 2003 draft report). The NESSIE participants include some of the foremost active
cryptographer
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or '' -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of adversarial behavior. More gen ...
s in the world, as does the CRYPTREC project.
NESSIE was intended to identify and evaluate quality cryptographic designs in several categories, and to that end issued a public call for submissions in March 2000. Forty-two were received, and in February 2003 twelve of the submissions were selected. In addition, five algorithms already publicly known, but not explicitly submitted to the project, were chosen as "selectees". The project has publicly announced that "no weaknesses were found in the selected designs".
Selected algorithms
The selected algorithms and their submitters or developers are listed below. The five already publicly known, but not formally submitted to the project, are marked with a "*". Most may be used by anyone for any purpose without needing to seek a patent license from anyone; a license agreement is needed for those marked with a "#", but the licensors of those have committed to "reasonable non-discriminatory license terms for all interested", according to a NESSIE project press release.
None of the six
stream cipher
stream cipher is a symmetric key cipher where plaintext digits are combined with a pseudorandom cipher digit stream ( keystream). In a stream cipher, each plaintext digit is encrypted one at a time with the corresponding digit of the keystrea ...
s submitted to NESSIE were selected because every one fell to
cryptanalysis
Cryptanalysis (from the Greek ''kryptós'', "hidden", and ''analýein'', "to analyze") refers to the process of analyzing information systems in order to understand hidden aspects of the systems. Cryptanalysis is used to breach cryptographic se ...
. This surprising result led to the
eSTREAM project.
Block ciphers
*
MISTY1:
Mitsubishi
The is a group of autonomous Japanese multinational companies in a variety of industries.
Founded by Yatarō Iwasaki in 1870, the Mitsubishi Group traces its origins to the Mitsubishi zaibatsu, a unified company that existed from 1870 to 194 ...
Electric
*
AES*: (Advanced Encryption Standard) (
NIST
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
,
FIPS Pub 197) (aka
Rijndael
The Advanced Encryption Standard (AES), also known by its original name Rijndael (), is a specification for the encryption of electronic data established by the U.S. National Institute of Standards and Technology (NIST) in 2001.
AES is a variant ...
)
*
Camellia
''Camellia'' (pronounced or ) is a genus of flowering plants in the family Theaceae. They are found in tropical and subtropical areas in East Asia, eastern and South Asia, southern Asia, from the Himalayas east to Japan and Indonesia. There are ...
:
Nippon Telegraph and Telephone
(NTT) is a Japanese telecommunications holding company headquartered in Tokyo, Japan. Ranked 55th in ''Fortune'' Global 500, NTT is the fourth largest telecommunications company in the world in terms of revenue, as well as the third largest pu ...
and Mitsubishi Electric
*
SHACAL-2:
Gemplus
Collision-Resistant Hash Functions
*
WHIRLPOOL
A whirlpool is a body of rotating water produced by opposing currents or a current running into an obstacle. Small whirlpools form when a bath or a sink is draining. More powerful ones formed in seas or oceans may be called maelstroms ( ). ''Vo ...
: Scopus Tecnologia S.A. and K.U.Leuven
*
SHA-256
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compressi ...
*,
SHA-384
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compression ...
* and
SHA-512
SHA-2 (Secure Hash Algorithm 2) is a set of cryptographic hash functions designed by the United States National Security Agency (NSA) and first published in 2001. They are built using the Merkle–Damgård construction, from a one-way compression ...
*:
NSA, (US FIPS 180-2)
Message Authentication Codes
*
UMAC:
Intel
Intel Corporation is an American multinational corporation and technology company headquartered in Santa Clara, California, and Delaware General Corporation Law, incorporated in Delaware. Intel designs, manufactures, and sells computer compo ...
Corp, Univ. of Nevada at Reno, IBM Research Laboratory,
Technion Institute, and Univ. of California at Davis
*
Two-Track-MAC:
Katholieke Universiteit Leuven
KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries.
In addition to its main camp ...
and debis AG
*EMAC: Berendschot et al.
*
HMAC
In cryptography, an HMAC (sometimes expanded as either keyed-hash message authentication code or hash-based message authentication code) is a specific type of message authentication code (MAC) involving a cryptographic hash function and a se ...
*: (ISO/IEC 9797-1);
Asymmetric encryption schemes
*
PSEC-KEM: Nippon Telegraph and Telephone Corp
*RSA-KEM*:
RSA key exchange mechanism (draft of ISO/IEC 18033-2)
*
ACE Encrypt#:
IBM
International Business Machines Corporation (using the trademark IBM), nicknamed Big Blue, is an American Multinational corporation, multinational technology company headquartered in Armonk, New York, and present in over 175 countries. It is ...
Zurich Research Laboratory
Digital signature algorithms
*
RSA-PSS:
RSA Laboratories
*
ECDSA: Certicom Corp
*
SFLASH: Schlumberger Corp (SFLASH was broken in 2007
and should not be used anymore).
Asymmetric Identification Schemes
*
GPS-auth: Ecole Normale Supérieure, France Télécom, and La Poste
Other entrants
Entrants that did not get past the first stage of the contest include
Noekeon
NOEKEON is a family of two block ciphers designed by Joan Daemen, Michaël Peeters, Gilles Van Assche and Vincent Rijmen and submitted to the NESSIE project in September 2000. The two ciphers are "direct mode" NOEKEON, to be used for maximum ...
,
Q,
Nimbus,
NUSH,
Grand Cru,
Anubis
Anubis (; ), also known as Inpu, Inpw, Jnpw, or Anpu in Ancient Egyptian (), is the god of funerary rites, protector of graves, and guide to the underworld in ancient Egyptian religion, usually depicted as a canine or a man with a canine hea ...
,
Hierocrypt,
SC2000, and
LILI-128.
Project contractors
The contractors and their representatives in the project were:
*
Katholieke Universiteit Leuven
KU Leuven (Katholieke Universiteit Leuven) is a Catholic research university in the city of Leuven, Belgium. Founded in 1425, it is the oldest university in Belgium and the oldest university in the Low Countries.
In addition to its main camp ...
(Prime contractor):
Bart Preneel,
Alex Biryukov
Alex Biryukov () is a cryptographer, currently a full professor at the University of Luxembourg.
Biography
His notable work includes the design of the stream cipher LEX, as well as the cryptanalysis of numerous cryptographic primitives. In 1998, ...
, Antoon Bosselaers, Christophe de Cannière, Bart Van Rompay
*
École Normale Supérieure
École or Ecole may refer to:
* an elementary school in the French educational stages normally followed by Secondary education in France, secondary education establishments (collège and lycée)
* École (river), a tributary of the Seine flowing i ...
:
Jacques Stern
Jacques Stern (born 21 August 1949) is a cryptographer, currently a professor at the École Normale Supérieure. He received the 2006 CNRS Gold medal. His notable work includes the cryptanalysis of numerous encryption and signature schemes, the ...
, Louis Granboulan, Gwenaëlle Martinet
*
Royal Holloway
Royal Holloway, University of London (RH), formally incorporated as Royal Holloway and Bedford New College, is a public university, public research university and a constituent college, member institution of the federal University of London. It ...
,
University of London
The University of London (UoL; abbreviated as Lond or more rarely Londin in Post-nominal letters, post-nominals) is a collegiate university, federal Public university, public research university located in London, England, United Kingdom. The ...
:
Sean Murphy, Alex Dent, Rachel Shipsey, Christine Swart, Juliette White
*
Siemens AG
Siemens AG ( ) is a German multinational technology conglomerate. It is focused on industrial automation, building automation, rail transport and health technology. Siemens is the largest engineering company in Europe, and holds the posit ...
: Markus Dichtl, Marcus Schafheutle
*
Technion Institute of Technology:
Eli Biham
Eli Biham () is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, afte ...
,
Orr Dunkelman, Vladimir Furman
*
Université catholique de Louvain
UCLouvain (or Université catholique de Louvain , French for Catholic University of Louvain, officially in English the University of Louvain) is Belgium's largest French-speaking university and one of the oldest in Europe (originally establishe ...
:
Jean-Jacques Quisquater, Mathieu Ciet, Francesco Sica
*
Universitetet i Bergen:
Lars Knudsen
Lars Ramkilde Knudsen (born 21 February 1962) is a Denmark, Danish researcher in cryptography, particularly interested in the design and cryptanalysis, analysis of block ciphers, cryptographic hash function, hash functions and message authentic ...
, Håvard Raddum
See also
*
ECRYPT
References
External links
The homepage of the NESSIE project
{{Cryptography navbox , public-key , block , hash
College and university associations and consortia in Europe
Cryptography contests
Cryptography standards
Information technology organizations based in Europe
Internet and the European Union
Research projects