Encyclopedia  |   World Factbook  |   World Flags  |   Reference Tables  |   List of Lists     
   Academic Disciplines  |   Historical Timeline  |   Themed Timelines  |   Biographies  |   How-Tos     
Sponsor by The Tattoo Collection
NESSIE
Main Page | See live article | Alphabetical index

NESSIE

NESSIE is an acronym for "New European Schemes for Signatures, Integrity, and Encryption", a European research project to identify secure cryptographic primitives. The project was comparable to the NIST AES process and the Japanese Government sponsored CRYPTREC project, but with notable differences from both. In particular, there is both overlap and disagreement between the selections and recommendations from NESSIE and CRYPTREC (as of the August 2003 draft report). The NESSIE participants include some of the foremost active cryptographers in the world, as does the CRYPTREC project; selections or recommendations from either must be taken quite seriously regardless of differences in conclusions.

NESSIE was intended to identify and evaluate quality cryptographic designs in several categories, and to that end issued a public call for submissions in March 2000. Forty-two were received, and in February 2003 twelve of the submissions were selected. In addition, five algorithms already publicly known, but not explicitly submitted to the project, were chosen as 'selectees'. The project has publicly announced that no weaknesses were found in the selected designs.

The selected algorithms and their submittors or developers are listed below. The five already publicly known, but not formally submitted to the project, are marked with a "*". All, save those marked with a "#", are in the public domain; the developers of those not in the public domain have committed to "reasonable non-discriminatory license terms for all interested", according to a NESSIE project press release.

Block ciphers:

Public-key encryption: MAC algorithms and cryptographic hash functions: Digital signature algorithms: Identification schemes: The contractors and their representatives in the project were:

External links


Block ciphers
Algorithms: 3-Way | AES | Blowfish | Camellia | CAST-128 | CAST-256 | CMEA | DEAL | DES | DES-X | FEAL | G-DES | GOST | IDEA | Iraqi | KASUMI | KHAZAD | Khufu and Khafre; | LOKI89/91 | LOKI97 | Lucifer | MacGuffin | Madryga | MAGENTA | MARS | MISTY1 | MMB | NewDES | RC2 | RC5 | RC6 | Red Pike; | S-1 | SAFER | Serpent | SHARK | Skipjack | Square | TEA | Triple DES; | Twofish | XTEA
Design: Feistel network; | Key schedule; | Product cipher; | S-box | SPN   Attacks: Brute force; | Linear / Differential cryptanalysis | Mod n; | XSL   Standardisation: AES process; | CRYPTREC | NESSIE   Misc: Avalanche effect | Block size; | IV | Key size; | Modes of operation; | Piling-up lemma; | Weak key;