7 November 1997
Source: http://csrc.nist.gov/encryption/aes/aesfaq.htm


Frequently Asked Questions - AES

Last Modified: October 27, 1997

This document is an attempt to summarize the questions which are most often asked of NIST regarding the AES development effort (particularly the Federal Register's request for candidate algorithm nominations. NIST's answers to these questions are intended to provide information to all persons interested in the AES development effort.

As stated in the Federal Register announcment referenced above, general questions concerning the AES development effort and request for candidate algorithm nominations may be sent electronically to AESQUEST@NIST.GOV or via fax to 301-948-1233 (Attn: AES Questions). Non-pertinent questions may be ignored.

Advanced Encryption Standard (AES) Frequently Asked Questions

This FAQ is organized in a manner that parallels the sections of the recent Federal Register's request for candidate algorithm nominations.


1.  Background
2.  Requirements for Candidate Algorithm Submission Packages

3.  Minimum Acceptability Requirements
4.  Evaluation Criteria
5.  First AES Conference
6.  Plans for Candidate Evaluation Process

7.  Miscellaneous


 1.  BACKGROUND


2.  REQUIREMENTS FOR CANDIDATE ALGORITHM SUBMISSION PACKAGES


2.A   Cover sheet


2.B  Algorithm Specifications and Supporting Documentation

2.B.1

2.B.2

2.B.3

2.B.4

2.B.5

2.B.6


2.C   Magnetic media

2.C.1  Reference Implementation

2.C.2 Mathematically Optimized Implementations

2.C.3 Test Values - Known Answer Tests and Monte Carlo Tests

2.C.4 Supporting Documentation

2.C.5 General Requirements for Magnetic Media


2.D   Intellectual Property Statements / Agreements / Disclosures

2.D.1  Statement by the Submitter

2.D.2  Statement by Patent (and Patent Application) Owner(s)

2.D.3  Statement by Reference/Mathematically Optimized Implementations’ Owner(s)


2.E  General Submission Requirements


3.  MINIMUM ACCEPTABILITY REQUIREMENTS


4.  EVALUATION CRITERIA


SECURITY (i.e., the effort required to cryptanalyze):


COST


ALGORITHM AND IMPLEMENTATION CHARACTERISTICS


5.  INITIAL PLANNING FOR THE FIRST AES CANDIDATE CONFERENCE


6.  PLANS FOR CANDIDATE EVALUATION PROCESS


6.A  Overview


6.B  Round 1 Technical Evaluation


6.C  Round 2 Technical Evaluation


7.  MISCELLANEOUS