

Interview With AES Author 51
Dave Wreski writes "I recently had a chance to ask Vincent Rijmen a few questions about Rijndael, the algorithm soon to replace DES. He talks about the development of the algorithm, his thoughts on the future of Internet security, Linux and security, and more. He's a pretty interesting guy, and had some interesting comments. You can find the interview
here"
Serpent (Score:1)
Re:Serpent (Score:1)
Re:Koeieuier (translation) (Score:1)
two words: (Score:1)
Re:That's not an answer! (Score:1)
- Actually we do know. Eli Biham and Adi Shamir (the S in RSA) discovered differential cryptanalysis in 1990. Differential cryptanalysis made short work of many algorithms of the day *except* DES. It was found that any other s-box configuration, including totally random ones, made the whole algorithm fall quickly to this new method. Subsequently, an IBM researcher admitted that they knew about differential cryptanalysis in the early seventies but the NSA convinced them that discussing the method or the s-box criteria would harm US interests.
So then, we still don't know. All you did is tell us why the S box values were picked (to thwart cryptanalysis. We knew this.), but not the method that determined those numbers.Why is this information still classified?
Actually he did.
Encryption Overload (Score:1)
At least with PGP I knew how to decode it, if someone sent me a encrypted email today, I would have no clue how to even identify it, nevermind decode it.
Is this depth of knowlege really required for a layman to take advantage of reasonable encryption security?
Re:Serpent (Score:1)
Um... er... it USED to take umpty-ump billion years.
(Unless you use NSA's backdoor...)
(No, wait... pretend I didn't say that...)
-- Michael Chermside
Re:Serpent (Score:1)
We could go back and forth on this for a while, but essentially it's a personal decision based on an opinion, and I respect your opinion but do not share it.
Firstly, your statement "Rijndael was the one that was least secure" is at best an opinion. Since (to my knowledge) not even a theoretical attack has been found for any of the AES candidates, there can be no objective measure of relative security.
Secondly, I'd take issue with the argument that once a basic threshold has been reached, more eyeballs = more vulnerable. I accept that pretty much all of the AES algorithms are going to be non-trivially broken, hence the caveat.
Note that there may well not exist an attack on these algorithms (although history and a study of the human condition suggests that this outcome is unlikely). Schneir's statement that the best one can say about an algorithm is that it hasn't been cracked yet applies for each and every scientific theory on the planet. This is mearly the most pessimistic (and most appropriate) statement that can be made.
To close, I'd also like to point out that any algorithm can be trivially implemented in an insecure manner. Hence, your hypothesis that Serpent is inherently more secure because it receives less attention is worthless. Remember that each and every *implementation* of the AES algorithms needs to be verified in an open manner for it to be trusted. This is a lot less likely to happen with uncommon implementations (except, of course, for the black-hats with something to gain). With the working assumption that most "new" crypto applications will adopt the AES winner and not the losers, this implies that most industry attention will be focussed on the continuing verification of Rijndael implementations. As time goes by, you can expect the experience-pool that has accumulated with verifying Rijndael implementations to improve - standard suites testing for known risky points etc. This works against you for implementations of more obscure, relatively less-well-known algorithms.
To close, therefore, I would like to suggest that you are still relying on a variant of Security by Obscurity, and that this is not necessarily a good thing for your long term cryptographic needs.
Re:Serpent (Score:1)
This is true for your own personal comfort level of "well studied". I think the benefit of the AES review period was that a large number of people + organisations interested in the results of this competition could pass a mutually agreed level of that parameter during the competition.
Personally speaking I don't know enough one way or the other to form an objective opinion. Like most people on the planet, outside my own limited horizon of speciality, I have to rely on other trusted experts' opinions and judgements. For me, therefore, having seen the manner in which the AES competition was conducted, and without knowing diddly-squat about the analyses of the algorithms in that competition, I'd have to conclude that if it's good enough for them it's good enough for me.
But if it don't float your boat, fine. If it's for a commercial crypto app then the market will decide, otherwise it's whatever your conscience will let you get away with.
Ain't crypto wonderfull? All those human interests (theoretical, mathematical, technical, ethical, commercial, practical, political) in one little field...
Re:A question I would have liked to seen asked... (Score:1)
I guess my feeling from the opinions expressed in the interview would be that yer man there just doesn't care. I get the impression he's far more interested in doing theoretical algorithm research than in any real-world applications.
Hence his comments - "Rijndael is the engine, it's up to someone else to build the car". In the context of your question, the Draft ThoughtCrime Treaty really addresses legislation of the "car" - applications, processes and protocols making use of encryption - rather than the "engine" (the encryption algorithm) itself.
Strange Questions (Score:1)
And where did the question about rfc2692 come from? I'm not surprised the reply was "No comment" (although "What are you talking about?" would be just as reasonable).
Re:Serpent (Score:1)
If any of the 5 AES candidates are going to be broken, the one most likely to be is the one that's studied the hardest. And, of all the algorithms, I'm pretty sure that Rijndael was the one that was least secure.
So going with Serpent doesn't seem like such an unwise move after all. It's all in the way you look at it. 'Security through not-that-many-eyeballs-looking-at-it-even-though-
--
Re:Koeieuier (translation) (Score:1)
Re:Koeieuier (translation) (Score:1)
He's a witch! (Score:1)
He said "hacker!" Burn him!!!
Re:Serpent (Score:1)
Um... er... it USED to take umpty-ump billion years.
In terms of security, triple-DES is also in the same class as serpent or rijndael.
(Unless you use NSA's backdoor...)
DES and triple-DES are probably the most publicly scrutinized crypto algorithms in history, no backdoor has been found. In fact, in retrospect, it's been found that the NSA's changes to the original DES algorithm actually made it stronger.
I assume you're trying for +1 funny.
Re:Serpent (Score:1)
I'm not disputing that Serpent is more secure than Rijndael. Nor I'm I disputing your right to use whatever algorithm you wish. But if it takes umpty-ump trillion years to break Rijndael, what does the extra security buy me besides slowness?
Re:We still don't know how S boxes in DES were cho (Score:1)
Eli Biham and Adi Shamir (the S in RSA) discovered differential cryptanalysis in 1990. Differential cryptanalysis made short work of many algorithms of the day *except* DES. It was found that any other s-box configuration, including totally random ones, made the whole algorithm fall quickly to this new method. Subsequently, an IBM researcher admitted that they knew about differential cryptanalysis in the early seventies but the NSA convinced them that discussing the method or the s-box criteria would harm US interests.
Re:Koeieuier (translation) (Score:1)
The most unpronouncable name of a beach-resort in the world!
All Germans come to this place in the Netherlands because they don't have their own resorts. Little joke: They're only worthy to stay if they can actually pronounce the name, if they can't, we'll kick them out!
Re:secure standard (Score:1)
It's pronounced Aye-Eee-Ess.
How hard is that?
Re:Patents etc. (Score:1)
An algorithm had to be free of patent and other intellectual property claims in order to apply as an AES candidate. Rijndael is not a "standout" in this respect as this was required as part of the process. Credit goes to NIST, which knew a standard would never be a standard if it was encumbered by IP.
Patents etc. (Score:1)
On a side note, was it just me, or did the interviewee seem to be in a bit of a mood?
---
A question I would have liked to seen asked... (Score:1)
Re:A question I would have liked to seen asked... (Score:1)
Re:Koeieuier (translation) (Score:1)
Enigma
Interesting moderation rant (Score:1)
--
Re:Poor michael. (Score:1)
Re:Patents etc. (Score:1)
Yeah "pretty interesting guy, and had some interesting comments" struck me as being a bit generous to him. Course I have nothing whatsoever to say so I shouldn't criticise.
:tcejbuS (Score:1)
Journalism just took a punch in the gut, staggered through a parking lot, where some thugs decided to steal his wallet, piss on his clothes, and poop in his briefcase.
Re:Encryption Overload (Score:1)
No, it isn't required by the layman, but yes it is required by someone in order to make sure the layman's encryption is secure. If there weren't people learning more about encryption and coming up with new algorithms and attacks the field would be stagnant.
cracked ! (Score:1)
Vincent Rijmen: It depends on how you count. Our research is a continuous process, and it's not easy to say when we started on Rijndael. About a year or two, I would estimate.
Calculation using Moores CPU law would suggest that this encryption algorithm should be cracked within 6 months.
I get 300 years (Score:2)
This calculation is of course pretty meaningless, but it gives you a rough idea.
--
More secure is relative (Score:2)
If I could work out a way of demonstrating that it didn't meet these goals, I'd be the world's most famous cryptanalysist in moments. But I'd still be a million miles away from a break that was actually any good for any real attack that any real adversary, even 3-letter agencies equipped with alien tech, could ever use against you.
There are some good attacks on very much weakened variants of Rijndael. Some people in the crypto world believe that full Rijndael will eventually be demonstrated not to be K-secure. However, no-one who knows what they're talking about thinks that any practical, useful break will ever be found. Really, Rijndael is more than good enough - the weaknesses in your system lie elsewhere.
--
Another interview with down to earth Belgian guys (Score:2)
And hey, they mention Linux there too! ;-)
Jacco /var/log
---
# cd
Koeieuier (Score:2)
--
Re:cracked ! (Score:2)
Explanation please.
What does Moore's Law have to do with the *identification* of an attack on an algorithm, or with the time to implement such an attack?
If you're implying that a +6-month CPU will be capable of brute-force attacking Rijndael, please explain why current processors cannot do this, and please give an estimate of the time taken to break an arbitary message (i.e. time to search 50% of keyspace).
For bonus points, please provide an estimate of the hardware resources required (now, in 6months, or sometime after the Pentium 6 is released, which ever takes your fancy) in order to provide a realistic interception capability for oh-let's-say AES-encrypted email in near-real-time.
"Broken" (Score:2)
Re:Still a TwoFish Fan (Score:2)
must not just be able to perform the algorithm, they must also be
protected from out-of-the-box attacks. It is much harder to guess
what a card device is doing from an EM emission analysis if it uses
simple operations such as in Rijndael, that if it uses more complex
operations such as in Sepent and Twofish. This isn't only a matter of
prevalent technology, it involves sensitive design issues as
well, ones that Rijndael went to more pains about that the other
finalists.
I think that Rijndael will prove to be the better technology for
quite a long time, and its selection will do a lot to promote the use
of good cryptography in the next few years.
NSA on AES (Score:2)
LinuxSecurity.com: What applications do you forsee it being used?
Vincent Rijmen: Many many applications. Protection of sensitive files
of the US government (mandatory). Email encryption. Mobile phones.
Smartcards.
Interesting to note that the NSA didn't say they would use AES. Schneier's last cryptogram [counterpane.com] speculated that they won't be using Rijndael for classified documents in the next few years.
Re:NSA on AES (Score:2)
Re:Koeieuier (translation) (Score:2)
herfstvrucht: autumn-fruit
angstschreeuw: scream of terror
koeieuier: Well, the thing hanging below a cow, where you get the milk from (dunno the trans
--
Re:Patents etc. (Score:2)
3DES has always been entirely free of IP claims, so I don't see what's changed really?
Yeah, the interviewee was a little cold!
Please, no more European software names! (Score:2)
Re:Serpent (Score:3)
Which nicely summarises why Rijndael won.
The competition was a nice, real-world example of a trade-off between absolute theoretical security and implementation. AES is intended to scale from smartcards to NSA supercomputers.
If AES had been about producing the most secure algorithm, period, then I guess the winner would have been one which included an infinite number of permutations... After all, if it takes an eternity to encrypt you can guarantee that it can't be broken after encryptions :-)
Note that you, too have found that what the US Gov' says doesn't necessarily apply to the real world either. However, your faith in Serpent is perhaps misguided. It may have received a similar level of analysis as Rijndael up to now, but you can guarantee that as an also-ran, it's not going to continue to receive this level of investigation. All of which leaves you more, not less, vulnerable in the longer term....
Re:Interesting approach (Score:3)
Well, it was apparently thought of earlier, in the late 1960s, by James Ellis and Clifford Cocks (who were British secret agents). However they did not publish (being secret agents). R,S+A thought it up independently 10 years later, and they were the first to publish. See this techweb story [techweb.com] for some more details.
Re:Interesting approach (Score:3)
AES homepage [nist.gov]
Also, Rivest, Shamir, and Adleman *did* invent RSA. I'm not sure what you're implying.
-konstant
Yes! We are all individuals! I'm not!
Still a TwoFish Fan (Score:3)
There were two lurking decision factors in the AES that concern me:
1) patents. it has not been made clear how much the hitachi claimed patent affected the outcome.
2) embedded devices. i believe that the decision was weighted in favor of current embedded memory and computational power, which doesn't make any sense. Embedded applications will be more powerful by the time anyone actually implements this stuff and I'd much rather have something that is excellent on real computers and fine on smart cards, but that doesn't seem to be what we've ended up with.
Anyway, I'm glad to see the process was open and all kvetching aside, Rijndael is a *huge* improvement over DES or even DESX or tripleDES. The authors of all algorithms deserve congratulations.
Re:Encryption Overload (Score:3)
Over time AES will be incorporated into all security products and will become a defacto standard. We can already see that GnuPG [gnupg.org] includes full support and NAI/PGP is expected to follow shortly.
It's nothing that end users will have learn / know - it'll just be included as the standard. If someone wanted to send you an encrypted mail today then they'd still use PGP (or similar), you can't just take Rijndael and encrypt an e-mail (or web session, or SSH session or whatever).
secure standard (Score:3)
Interesting approach (Score:4)
--
Security of selected proposals (Score:4)