CAESAR Competition

Last updated

The Competition for Authenticated Encryption: Security, Applicability, and Robustness (CAESAR) is a competition organized by a group of international cryptologic researchers to encourage the design of authenticated encryption schemes. [1] The competition was announced at the Early Symmetric Crypto workshop in January 2013 and the final portfolio in February 2019.

Contents

Use Cases

The final CAESAR portfolio is organized into three use cases: [2]

Final Portfolio

The final portfolio announced by the CAESAR committee is: [2]

Use Case 1 (Lightweight applications)Use Case 2 (High-performance applications)Use Case 3 (Defense in depth)
Ascon AEGIS-128Deoxys-II
ACORN OCB COLM

CAESAR committee

The committee in charge of the CAESAR Competition consisted of: [3]

Related Research Articles

In computing, Internet Protocol Security (IPsec) is a secure network protocol suite that authenticates and encrypts packets of data to provide secure encrypted communication between two computers over an Internet Protocol network. It is used in virtual private networks (VPNs).

The Advanced Encryption Standard (AES), the symmetric block cipher ratified as a standard by National Institute of Standards and Technology of the United States (NIST), was chosen using a process lasting from 1997 to 2000 that was markedly more open and transparent than its predecessor, the Data Encryption Standard (DES). This process won praise from the open cryptographic community, and helped to increase confidence in the security of the winning algorithm from those who were suspicious of backdoors in the predecessor, DES.

S/MIME is a standard for public-key encryption and signing of MIME data. S/MIME is on an IETF standards track and defined in a number of documents, most importantly RFC 8551. It was originally developed by RSA Data Security, and the original specification used the IETF MIME specification with the de facto industry standard PKCS #7 secure message format. Change control to S/MIME has since been vested in the IETF, and the specification is now layered on Cryptographic Message Syntax (CMS), an IETF specification that is identical in most respects with PKCS #7. S/MIME functionality is built into the majority of modern email software and interoperates between them. Since it is built on CMS, MIME can also hold an advanced digital signature.

IEEE 802.11r-2008 or fast BSS transition (FT), is an amendment to the IEEE 802.11 standard to permit continuous connectivity aboard wireless devices in motion, with fast and secure client transitions from one Basic Service Set to another performed in a nearly seamless manner. It was published on July 15, 2008. IEEE 802.11r-2008 was rolled up into 802.11-2012. The terms handoff and roaming are often used, although 802.11 transition is not a true handoff/roaming process in the cellular sense, where the process is coordinated by the base station and is generally uninterrupted.

Authenticated Encryption (AE) is an encryption scheme which simultaneously assures the data confidentiality and authenticity. Examples of encryption modes that provide AE are GCM, CCM.

eSTREAM is a project to "identify new stream ciphers suitable for widespread adoption", organised by the EU ECRYPT network. It was set up as a result of the failure of all six stream ciphers submitted to the NESSIE project. The call for primitives was first issued in November 2004. The project was completed in April 2008. The project was divided into separate phases and the project goal was to find algorithms suitable for different application profiles.

<span class="mw-page-title-main">VEST</span> Family of stream ciphers

VEST (Very Efficient Substitution Transposition) ciphers are a set of families of general-purpose hardware-dedicated ciphers that support single pass authenticated encryption and can operate as collision-resistant hash functions designed by Sean O'Neil, Benjamin Gittins and Howard Landman. VEST cannot be implemented efficiently in software.

The Texas Instruments digital signature transponder (DST) is a cryptographically enabled radio-frequency identification (RFID) device used in a variety of wireless authentication applications. The largest deployments of the DST include the Exxon-Mobil Speedpass payment system, as well as a variety of vehicle immobilizer systems used in many late model Ford, Lincoln, Mercury, Toyota, Nissan, Kia, Hyundai and Tesla vehicles.

<span class="mw-page-title-main">Gemalto</span> International digital security company

Gemalto was an international digital security company providing software applications, secure personal devices such as smart cards and tokens, e-wallets and managed services. It was formed in June 2006 by the merger of two companies, Axalto and Gemplus International. Gemalto N.V.'s revenue in 2018 was €2.969 billion.

The Belgian American Educational Foundation (BAEF) is an educational charity. It supports the exchange of university students, scientists and scholars between the United States and Belgium. The foundation fosters the higher education of deserving Belgians and Americans through its exchange-fellowship program. Since 1977, Dr. Emile Boulpaep is the president of the BAEF.

The Computer Security and Industrial Cryptography research group, commonly called COSIC, is a research group at the Department of Electrical Engineering of KU Leuven, which is headed by Bart Preneel.

The following outline is provided as an overview of and topical guide to cryptography:

IEC 62351 is a standard developed by WG15 of IEC TC57. This is developed for handling the security of TC 57 series of protocols including IEC 60870-5 series, IEC 60870-6 series, IEC 61850 series, IEC 61970 series & IEC 61968 series. The different security objectives include authentication of data transfer through digital signatures, ensuring only authenticated access, prevention of eavesdropping, prevention of playback and spoofing, and intrusion detection.

<span class="mw-page-title-main">KU Leuven</span> Catholic research university in Leuven, Belgium

KU Leuven is a Catholic research university in the city of Leuven, Belgium. In addition to its main campus in Leuven, it has satellite campuses in Kortrijk, Antwerp, Ghent, Bruges, Ostend, Geel, Diepenbeek, Aalst, Sint-Katelijne-Waver, and in Belgium's capital Brussels. KU Leuven is the largest university in Belgium and the Low Countries. In 2021–22, more than 65,000 students were enrolled, with 21% being international students. Its primary language of instruction is Dutch, although several programs are taught in English, particularly graduate and postgraduate degrees.

<span class="mw-page-title-main">Patrick Schöffski</span>

Patrick Schöffski is a German medical doctor specializing in internal medicine, hematology and medical oncology.

The International Conference on Information Systems Security and PrivacyICISSP – aims to create a meeting point for practitioners and researchers interested in security and privacy challenges that concern information systems covering technological and social issues.

Wire is an encrypted communication and collaboration app created by Wire Swiss. It is available for iOS, Android, Windows, macOS, Linux, and web browsers such as Firefox. Wire offers a collaboration suite featuring messenger, voice calls, video calls, conference calls, file-sharing, and external collaboration – all protected by a secure end-to-end-encryption. Wire offers three solutions built on its security technology: Wire Pro – which offers Wire's collaboration feature for businesses, Wire Enterprise – includes Wire Pro capabilities with added features for large-scale or regulated organizations, and Wire Red – the on-demand crisis collaboration suite. They also offer Wire Personal, which is a secure messaging app for personal use.

Ingrid Verbauwhede is a professor at the COSIC Research Group of the Electrical Engineering Department, KU Leuven, where she leads the embedded systems team. She is a pioneer in the field of secure embedded circuits and systems, with several awards recognising her contributions to the field. She is member of the Royal Flemish Academy of Belgium for Science and the Arts since 2011. She is a fellow of IEEE.

Ascon is a family of lightweight authenticated ciphers that had been selected by US National Institute of Standards and Technology (NIST) for future standardization of the lightweight cryptography.

References

  1. "CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness".
  2. 1 2 "CAESAR submissions".
  3. "CAESAR committee".