NIST Symmetric Key Block Cipher Algorithms workshop

Declan McCullagh declan at well.com
Tue Mar 27 07:44:18 PST 2001



http://a257.g.akamaitech.net/7/257/2422/14mar20010800/frwebgate.access.gpo.gov/cgi-bin/getdoc.cgi?dbname=2001_register&docid=01-7497-filed

[Federal Register: March 27, 2001 (Volume 66, Number 59)]
[Notices]
[Page 16658-16659]
 From the Federal Register Online via GPO Access [wais.access.gpo.gov]
[DOCID:fr27mr01-38]

-----------------------------------------------------------------------

DEPARTMENT OF COMMERCE

National Institute of Standards and Technology


Public Meeting Announcing a Workshop for the Analysis of Modes of
Operation for Symmetric Key Block Cipher Algorithms

AGENCY: National Institute of Standards and Technology, Commerce.

ACTION: Notice of public workshop.

-----------------------------------------------------------------------

SUMMARY: The National Institute of Standards and Technology (NIST)
announces a workshop on modes of operation for securing data using
symmetric key block cipher algorithms, such as the algorithm specified
in the draft Advanced Encryption Standard (AES). Interested parties may
suggest ideas or submit papers for discussion at the workshop,
including proposals of modes of operation, to the address below.

DATES: The Second Modes of Operation Workshop will be held on August
24, 2001, from 9:00 a.m. to 5:00 p.m.

ADDRESSES: The workshop will be held at the Holiday Inn Santa Barbara,
5650 Calle Real, Goleta, California. Details regarding workshop
registration will be available at the modes home page: http://
csrc.nist.gov/encryption/aes/modes/. Suggestions, questions, comments
or submissions should be sent to Modes of Operation Workshop, Attn:
Elaine Barker, NIST, 100 Bureau Drive, Stop 8930, Gaithersburg, MD
20899-8930, or to EncryptionModes at nist.gov.

FOR FURTHER INFORMATION CONTACT: For further information, contact
EncryptionModes at nist.gov or one of the following: Elaine Barker, NIST,
100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-8930; telephone
301-975-2911; fax 301-948-1233 or via e-mail at Elaine.barker at nist.gov;
or Morris Dworkin 100 Bureau Drive, Stop 8930, Gaithersburg, MD 20899-
8930; telephone 301-975-2354; fax 301-948-1233; or via e-mail at
morris.dworkin at nist.gov.

SUPPLEMENTARY INFORMATION: Block ciphers can be used as building blocks
for encryption modes and for other modes for securing data. For
example, block ciphers can be used in the construction of message
authentication codes, hash algorithms, and random bit generators. With
the advent of new block ciphers, such as the AES, there is an
opportunity to update such modes of operation for current and future
applications and technology.
     The purpose of this Federal Register notice is to announce a
workshop on modes of operation for securing data using symmetric key
block cipher algorithms, such as the algorithm specified in the draft
Advanced Encryption Standard (AES). Prior to the workshop, suggestions
and submissions from the public to aid NIST in planning an appropriate
workshop and facilitate the comparison and analysis of block cipher
modes of operation are welcome. The workshop will aid NIST in
developing a standard or guideline that is secure and responsive to the
needs of government, industry, and the public. NIST will consider for
discussion at the workshop, at a minimum, the modes that were proposed
at the October 20, 2000 public workshop on this topic. These are
available at the modes home page, and NIST encourages public analysis
of these modes.
     The workshop may also consider other existing modes or their
generalizations, or other modes that are proposed in comments and
papers. It will be helpful to receive analysis and proposals for
variations of counter mode, arising from alternative methods for
prescribing the generation of counters. All suggestions received will
be publicly available at the modes home page.
     In order to encourage a common framework for comparison, a workshop
approach to evaluate and analysis is available on the modes home page.
NIST believes that participants in the upcoming workshop would be
interested in comments that include statements regarding the
intellectual property and/or licensing requirements of any proposed
modes. Test vectors will also be useful, to provide analyzers of the
modes a means to check the validity of their implementations. Fuller
descriptions are available at the modes web site.
     The results of the workshop will aid NIST's efforts to develop a
complete ``suite'' of modes of operation from which individual modes
can be selected to fit the needs of a wide range of applications and
environments. The recommended modes are expected to support the
eventual Advanced Encryption Standard (AES) and other block ciphers.
     Submissions for discussion at the workshop should be made early
enough to provide time to prepare the meeting agenda. Papers proposing
new modes of operation are requested as soon as possible, to provide
time for the analysis of the new proposals.

     Authority: NIST's activities to develop computer security
standards to protect sensitive (unclassified) systems are undertaken
pursuant to specific responsibilities assigned to NIST in section

[[Page 16659]]

5131 of the Information Technology Management Reform Act of 1996
(P.L. 104-106), the Computer Security Act of 1987 (Pub. L. 100-235),
and Appendix III to Office of Business Management Circular A-130.

     Dated: March 19, 2001.
Karen Brown,
Acting Director, NIST.






More information about the cypherpunks-legacy mailing list