Jump to content

NESSIE

From Wikipedia, the free encyclopedia
European research program in cryptography, 2000-2003
For other uses, see Nessie (disambiguation).
This article relies excessively on references to primary sources. Please improve this article by adding secondary or tertiary sources.
Find sources: "NESSIE" - news * newspapers * books * scholar * JSTOR
(April 2015) (Learn how and when to remove this message)

NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000 to 2003 to identify secure cryptographic primitives. The project was comparable to the NIST AES process and the Japanese Government-sponsored CRYPTREC project, but with notable differences from both. In particular, there is both overlap and disagreement between the selections and recommendations from NESSIE and CRYPTREC (as of the August 2003 draft report). The NESSIE participants include some of the foremost active cryptographers in the world, as does the CRYPTREC project.

NESSIE was intended to identify and evaluate quality cryptographic designs in several categories, and to that end issued a public call for submissions in March 2000. Forty-two were received, and in February 2003 twelve of the submissions were selected. In addition, five algorithms already publicly known, but not explicitly submitted to the project, were chosen as "selectees". The project has publicly announced that "no weaknesses were found in the selected designs".

Selected algorithms

[edit]

The selected algorithms and their submitters or developers are listed below. The five already publicly known, but not formally submitted to the project, are marked with a "*". Most may be used by anyone for any purpose without needing to seek a patent license from anyone; a license agreement is needed for those marked with a "#", but the licensors of those have committed to "reasonable non-discriminatory license terms for all interested", according to a NESSIE project press release.

None of the six stream ciphers submitted to NESSIE were selected because every one fell to cryptanalysis. This surprising result led to the eSTREAM project.

Block ciphers

[edit]

Collision-Resistant Hash Functions

[edit]

Message Authentication Codes

[edit]

Asymmetric encryption schemes

[edit]

Digital signature algorithms

[edit]

Asymmetric Identification Schemes

[edit]
  • GPS-auth: Ecole Normale Superieure, France Telecom, and La Poste

Other entrants

[edit]

Entrants that did not get past the first stage of the contest include Noekeon, Q, Nimbus, NUSH, Grand Cru, Anubis, Hierocrypt, SC2000, and LILI-128.

Project contractors

[edit]

The contractors and their representatives in the project were:

See also

[edit]

References

[edit]
  1. ^ Vivien Dubois; Pierre-Alain Fouque; Adi Shamir; Jacques Stern (2007-04-20), Practical Cryptanalysis of SFLASH, retrieved 2017-03-03
[edit]
Algorithms
Integer factorization
Discrete logarithm
Lattice/SVP/CVP/LWE/SIS
Others
Theory
Standardization
Topics
Common
algorithms
Less common
algorithms
Other
algorithms
Design
Attack
(cryptanalysis)
Standardization
Utilization
Common functions
SHA-3 finalists
Other functions
Password hashing/
key stretching functions
General purpose
key derivation functions
MAC functions
Authenticated
encryption
modes
Attacks
Design
Standardization
Utilization
General
Mathematics