Blog

25 Years of standardization in cryptography

Standardization of encryption algorithms since the turn of the millennium

Due to a significant change in the political situation in the 1990s, cryptography ceased to be the domain of spies, and the development of technology enabled the use of these approaches in science and commerce. In order to facilitate this made it necessary to ensure adequate standardization. This article seeks to summarize standardization activities.

Standardization activities in cryptography

During the late twentieth and early twenty-first centuries, several standardization competitions emerged which had an impact on cryptography and its implementation. Whether it be the DES algorithms (which originated significantly earlier) and AES, the hash function of SHA-1, SHA-2, SHA-3, or currently Post Quantum Cryptography or LightWeight Cryptography. All are reactions of industry and commerce to ensure confidentiality, integrity, trustworthiness and authenticity of communication.
In the field of standardization, the two leading countries from the Cold War era were the Western Bloc, represented by the US and its allies, compared to the Eastern Bloc and its satellites. Initially, they were algorithms designed for military communications and state secrets. After the moderation of international relations, these tools were used in commerce, industry and services. Unfortunately, at present, a significant number of organizations overlook the lessons of this era. More precisely, confidentiality does not ensure the integrity or authenticity of a message. Similarly, in the field of IT, the Kerckhoff rules are forgotten. One of them has been saying for over 150 years: "Cryptography must be safe and easy to use, must not require an increased intellectual burden".

USA

In the field of cryptography, standardization has a long tradition in the United States. An example is the famous "Rainbow series" of books on security (rainbow series), which subsequently developed into Common Criteria. A large number of these rules originated in the military and were published over the years, for example, by the NIST Institute, eventually they were standardized and became known at the federal level as FIPS.
The Standardization Institute cooperates with the NSA, which ensures the security of communications of a government organization. Unfortunately, the cooperation with this organization is not always perceived positively. There have been several problems in history that make the relationship to the NSA at least ambivalent (ECB mode, DES and 3DES, Dual EC_DRBG, Simon&Speck) and some procedures can be called kleptography. On the other hand, for the development of security and cryptography, despite all the aforementioned maladies, the NSA has done a huge amount of work.

DES (Digital Encryption Standard, USA)

One of the first standards was the DES algorithm (FIPS 146), which was developed at IBM. Horst Feistel was behind the development of this algorithm, who developed the original Lucifer algorithm as early as the second half of the 1960s. It was decided to publish it in early 1970, and since around that time there was a demand for an encryption standard, IBM and the NSA established a close collaboration. Thanks to this collaboration, the algorithm continued to evolve but there were also distinctive features of the algorithm. The result was the DES algorithm, which was subsequently standardized in 1977. Later, due to the key being too short, the 3DES algorithm was implemented. It used several passes through the DES algorithm, each with a different key. This resulted in a kind of extension of the key material either in the form of three encryptions and three keys, or two keys and the EDE mode (encryption-decryption-encryption). In 2004 the DES algorithm was declared obsolete, around 2017 all 64b algorithms were generally declared obsolete due to the Sweet32 attack. As of January 1, 2024, neither DES nor 3DES may be used anymore.

SHA (SHA0, SHA 1, Secure Hash Algorithm, USA)

This was not a competition, the SHA algorithm (SHA-0 / FIPS 180) was designed in 1992 by the NSA and standardized in 1993. Due to the vulnerabilities found, modifications were made to this algorithm and in 1994, the NSA proposed its successor SHA1 (FIPS 180-1 and later FIPS 180-2). This was standardized a year later. In both cases, the Merkle–Damgård architecture was used. The algorithm has a limit on the length of input and the hash does not contain information about this length, so it is possible to attack by extending the hashed text.

AES (Advanced Encryption Standard, USA)

Based on significant community development and criticism of the NSA's cryptographic algorithms, there was for the first time a public contest for a new standard called AES (FIPS 197). What was the cause of this award is likely to be a long discussion, but in any case it was an excellent move. There was competition between cryptologists from almost all over the world, the contest was practically free, the standard was promoted by the contest itself. At the same time, suspicion of a possible back door was effectively eliminated, as it is very difficult to push such things into existing algorithms. At the same time it was the first American standardization contest ever won by a non-American (Joan Daemen and Vincent Rijmen). NIST released an economic impact analysis in 2017, and the potential economic impact of the algorithm is estimated to be around $250 trillion. The list of contestants is in the following table:

AlgorithmRound 1FinalistsWinner
CAST-256yes--
CRYPTONyes--
DEALyes--
DFCyes--
E2yes--
FROGyes--
HPCyes--
LOKI97yes--
MAGENTAyes--
MARSyesyes-
RC6yesyes-
RijndaelyesyesAES
SAFER+yes--
Serpentyesyes-
Twofishyesyes-

SHA-2 (Secure Hash Algorithm, USA)

Again, this was not a competition, the SHA2 algorithm was designed by the NSA in 1999-2001 and standardized in 2002. At that time, the results of the AES algorithm competition were still pending and efforts were still underway to evaluate impact and safety, so the classical approach was probably chosen. As with SHA-1, this was the Merkle–Damgård architecture. The design developed the original SHA-1 design, extended the output length from 160b to 256/384/512b, tried to deal with the mistakes of the original design, and was published under the name SHA2 (FIPS 180-2). Unfortunately, there remained restrictions on the maximum input size, or the lack of influence of input text length on the output hash.

SHA-3 (Secure Hash Algorithm, USA)

Based on the success of the AES competition and the search for a new hash function design, a competition was launched for a new hashing standard. Existing versions of SHA1/SHA2 had some limitations that were pointed out in the community. For these reasons, an international competition was held again, running from 2009 to 2012. In year 2014 saw the publication of a new standard. The result was a hash function built on a new architecture, called like Sponge function.
How to imagine this "sponge" function? The base is the input memory. This contains a part, referred to as a reservoir, the second is inserted with the input texts. XOF (eXpendable Output Function) operations are performed over the input memory, that combine the contents of memory. If we imagine this on a model of a classic washing sponge and water container, always when soak the sponge in water, fill it with water - the input text. Its compression makes XOF and throws away part of the data, part always stays inside. After we transfer all the water (data) from the container with the sponge, we can really wring it out provide output hash.
The winner of this competition was the KECCAK algorithm, hereinafter referred to as SHA-3 (FIPS 202). Outside of this architecture, other interesting approaches were created, one of them was the HAIFA design, used e.g. in the Blake/Blake2/Blake3 algorithm. Next, it was the second competition won by a non-American team. Coincidentally it was the same team of winners as in the AES competition.

AlgorithmSubmissionRound 1Round 2FinalistWinnerStatus
Abacusyes---Withdrawn
ARIRANGyes---Discarded
AURORAyes---Broken
BLAKEyesyesyes-Discarded
Blenderyes---Broken
Blue Midnight Wishyesyes--Discarded
Booleyes---Withdrawn
CRUNCHyes---Discarded
CubeHashyesyes--Discarded
DCHyes---Withdrawn
Dynamic SHAyes---Broken
Dynamic SHA2yes---Broken
ECOHyes---Broken
Edon-Ryes---Broken
ECHOyesyes--Discarded
EnRUPTyes---Broken
ESSENCEyes---Broken
FSByes---Discarded
Fugueyesyes--Discarded
Grøstlyesyesyes-Discarded
Hamsiyesyes-Discarded
HASH 2Xnot accepted----Removed
Cheetahyes---Broken
CHIyesDiscarded
JHyesyesyes-Discarded
KeccakyesyesyesSHA-3Standard
Khichidi-1yes---Withdrawn
LANEyes---Discarded
Lesamntayes---Discarded
Luffayesyes--Discarded
LUXyes---Broken
Maracanot accepted----Removed
MCSSHA-3yes---Broken
MD6yes---Discarded
MeshHashyes---Withdrawn
NaSHAyes---Broken
NKS 2Dnot accepted----Removed
Ponicnot accepted----Removed
SANDstormyes---Discarded
Sarmalyes---Discarded
Sgàilyes---Broken
Shabalyesyes--Discarded
SHAMATAyes---Withdrawn
SHAvite-3yesyes--Discarded
SIMDyesyes--Discarded
Skeinyesyesyes-Discarded
Spectral Hashyes---Broken
StreamHashyes---Withdrawn
SWIFFTXyes---Discarded
Tangleyes---Withdrawn
TIB3yes---Discarded
Twisteryes---Broken
Vortexyes---Broken
WaMMyes---Withdrawn
Waterfallyes---Withdrawn
ZK-Cryptnot accepted----Removed

LWC (LightWeight Cryptography, USA)

The light cryptography competition covered specific requirements for encryption algorithms, designed for systems with limited resources. The term covers low performance or low processor capabilities, low memory, insufficient randomness inputs or missing cryptoaccelerators. It can be the Internet of things, industrial systems, payment or access cards, etc. Even these devices need to provide acceptable communication protection, but the available resources for standard algorithms may not be enough. For this reason, the contest was announced in 2018 and the winners were announced in 2023. A draft for the new standard is currently published. The winner of this contest was the ASCON algorithm (NIST SP 800-232), which provides adequate protection even for devices with such limited capabilities. Interestingly, this algorithm was also the winner of the European CAESAR competition (see below)

AlgorithmRound 1Round 2Finalist
ACEDiscarded-
ASCONASCON
Bleep64Discarded--
CiliPadiDiscarded--
CLAEDiscarded--
CLXDiscarded--
COMETDiscarded-
DryGASCONDiscarded-
ElephantElephant
ESTATE--
FlexAEADDiscarded--
ForkAEDiscarded-
FountainDiscarded--
GAGE and InGAGEDiscarded--
GIFT-COFBGIFT-COFB
GimliDiscarded-
Grain-128AEADGrain-128AEAD
HERN&HERONDiscarded--
HYENADiscarded-
ISAPISAP
KNOTDiscarded-
LAEMDiscarded--
Liliput-AEDiscarded--
LimdolenDiscarded--
LOTUS-AEAD and LOCUS-AEADDiscarded-
mixFeedDiscarded-
ORANGEDiscarded-
OribatidaDiscarded-
PHOTON-Beetle--
PyjamaskDiscarded-
QameleonDiscarded--
QuartetDiscarded--
REMUSDiscarded--
RomulusRomulus
SAEAESDiscarded-
SaturninDiscarded-
Shamash&ShamashashDiscarded--
SIMPLEDiscarded--
SIV-Rijndael256Discarded--
SIV-TEM-PHOTONDiscarded--
SKINNY-AEAD/SKINNY-HASHDiscarded-
SNEIKDiscarded--
SPARKLE (SCHWAEMM and ESCH)SPARKLE
SPIXDiscarded-
SpoCDiscarded-
SpookDiscarded-
Subterranean 2.0Discarded-
SUNDAE-GIFTDiscarded-
SyconDiscarded--
Thank Goodness It’s Friday (TGIF)Discarded--
TinyJambuTinyJambu
TriadDiscarded--
TRIFLEDiscarded--
WAGEDiscarded-
XoodyakXoodyak
Yarará and CoralDiscarded--

PQC (Post Quantum Cryptography, USA)

A competition for new standards for quantum computer-resistant cryptography has been running since 2017. This competition expanded in 2022 to include a branch known as the Additional Digital Signature Scheme, Currently the first cryptographic schemes ML-KEM (FIPS 203), ML-DSA (FIPS 204) and SHL-DSA (FIPS 205) are available. The FN-DSA (FIPS 206) standard is in the design phase. Although we have a large number of digital signature algorithms from both the main and the secondary standardization branch, unfortunately for the time being only a single algorithm for key negotiation is available. The search for alternatives in this area is currently one of the important goals of standardization institutions. More about the algorithms that are part of the above selections in a separate article.

Europe

NESSIE and eSTREAM were two consecutive competitions that had an interesting connection from the cryptography point of view. The reason is simple, the eSTREAM contest is the direct successor of NESSIE. The reason was the failure of all current cipher contestants in the NESSIE contest. In addition to the two ECRYPT contests, two others were held in Europe, the PHC community contests and the CAESAR contest.

NESSIE (New European Schemes for Signatures, Integrity, and Encryption, Europe)

The NESSIE project was announced in 2000 and closed in 2003. It was inspired by the AES contest and focused on finding new encryption algorithms for Europe. In the case of current algorithms, however, it encountered a considerable problem of insufficient level of development. Virtually all current ciphers were excluded during the contest and, based on the knowledge gained, the eSTREAM project was subsequently launched a year later. Thanks to this project, significant progress was made in the field of current ciphers. At the same time, the NESSIE project accepted the newly selected AES algorithm (the result of the US contest) for use in Europe, as well as the newly selected CAMMELIA algorithm (the result of the Japanese competition CRYPTREC).

AlgoritmusSubmissionPhase 1Phase 2Finalist
CS-Cipher (64b)Discard--
Hierocrypt-L1 (64b)Discard--
IDEA (64b)YesDiscard-
Khazad (64b)YesDiscard-
MISTY 1 (64b)YesMISTY-1
Nimbus (64b)Discard--
Anubis (128b)Discard--
Camellia (128b)YesCamellia
Grand Cru (128b)Discard--
Hierocrypt-3 (128b)Discard--
Noekeon (128b)Discard--
Q (128b)Discard--
SC2000 (128b)Discard--
SHACAL (160b)SHACAL-1/SHACAL-2SHACAL-2
NUSH (variable lengtg)Discard--
RC6 (variable lengtg)Discard--
SAFER++ (variable lengtg)YesDiscard-
BGML (stream)BGML 1Discard-
Leviatan (stream)Discard--
LILI-128 (stream)Discard--
SNOW (stream)SNOW 2.0Discard-
SOBER-t16 (stream)YesDiscard-
SOBER-t32 (stream)YesDiscard-
Two-Track-MAC (MAC)YesTwo-Track-MAC
UMAC (MAC)YesUMAC
Whirlpool (hash)YesWhirlpool
ACE Encrypt (KEM)YesACE-Ecnrypt
ECIES (KEM)YesDiscard-
EPOC (KEM)EPOC-2Discard-
PSEC (KEM)PSEC-KEMPSEC-KEM
RSA-OAEP (KEM)YesRSA-KEM
ACE Sign (DSA)Discard--
ECDSA (DSA)YesECDSA
ESIGN (DSA)ESIGN-DDiscard-
FLASH (DSA)Discard--
QUARTZ (DSA)YesDiscard-
RSA-PSS (DSA)YesRSA-PSS
SFLASH (DSA)SFLASHv2/SFALSHv3SFLASH
GPS (Asymmetric ID)GPSv2.0GPS

eSTREAM (ECRYPT Stream Cipher Project)

The successor to the NESSIE competition was eSTREAM. It started its activities in 2004 and the results were announced already in 2008. It focused purely on the development and choices in the field of current algorithms. One of the results of this competition was the very popular SALSA family of algorithms (Salsa/12, Salsa20, ChaCha/12 and ChaCha/20). The Blake group of hash algorithms (architecture HAIFA) was subsequently created.

AlgorithmSubmissionRound 1Round 2FinalistWinners
ABC v3 (supersedes: ABC v1)Discard--
Achterbahn-80 (also Achterbahn-128)Discard--
CryptMT v3 (supersedes: CryptMT v1, Fubuki)Discard-
DECIM v2 (supersedes: DECIM v1)Discard-
DICING P2 (supersedes: DICING P1)Discard--
DragonDiscard-
Edon-80Discard-
F-FCSR-HWidthraw----
F-FCSR-H (also F-FCSR-16; supersedes: F-FCSR)Discard-
FrogbitDiscard---
Grain v1 (supersedes: Grain v0)HardwareHardware
HC-128 (also HC-256)SoftwareSoftware
Hermes8Discard--
LEXDiscard-
MAGDiscard---
MICKEY 2.0 (also MICKEY-128 v2)HardwareHardware
Mir-1Discard---
MOUSTIQUE (supersedes: MOSQUITO)Discard-
NLS v2 (supersedes: NLS v1)Discard-
PhelixDiscard--
Polar Bear v2 (supersedes: Polar Bear v1)Discard--
POMARANCH v3 (supersedes: POMARANCH v1)Discard-
PyDiscard--
RabbitSoftwareSoftware
Salsa20/12 (also Salsa20/8, Salsa20)SoftwareSoftware
SFINKSDiscard---
SOSEMANUKSoftwareSoftware
SSSDiscard---
TRBDK3 YAEADiscard---
TriviumHardwareHardware
TSC-4 (supersedes: TSC-3)Discard--
VEST P2 (supersedes: VEST P1)Discard--
WG P2 (supersedes: WG P1)Discard--
YambDiscard---
ZK-Crypt P2 (supersedes: ZK-Crypt P1)Discard--

PHC (Password Hashing Competition, Europe)

For the purpose of password authentication, a separate database with data in open form was originally used, then the DES algorithm for symmetric encryption began to be used. At the same time, crypt interface was created, its first use is dated back to 1974. The use of hash functions for one-way authentication was a matter of the 1980s and 1990s. Their unidirectionality was an advantage over symmetric ciphers. Unfortunately, with their use, there were also attacks that targeted both the hash functions and the way they were used. Initially, it was a use for hash functions for rainbow table (Rainbow table). In this case, the computation occurs and thus the exchange of computational time for disk space, thus greatly speeding up the attack. Fortunately, the use of rainbow tables is limited to a narrow range of possible inputs and can be relatively easily prevented by using salt (a parameter generated for each individual password separately). Unfortunately, the hash functions are not perfect and it was necessary to come up with additional methods of protection that move the attacker beyond the area of attack profitability. The first step was compound hash functions (HMAC), followed by PBKDF2 above hash functions and finally a special class of slow hash functions was searched for.
The special class of slow hash functions is able to prevent the creation of rainbow tables and has increased demands on memory and processor. This increases the cost of the attack beyond what the attacker accepts. In 2013, a PHC contest was announced and closed two years later. The goal was to ensure standardization, eventually cooperation with the authorities came to an end. Nevertheless, a winner was found and generally accepted, others algorithms were found to be extremely promising. The full list is as follows:

NameSubmissionRound 1Round 2Finalist
AntCryptDiscarded--
Argon and Argon2Winner
battcryptDiscarded-
CatenaSpecial recognition
CatfishNot accepted---
CentrifugeDiscarded--
EARWORMDiscarded--
GambitDiscarded--
LanareaDiscarded--
Lyra2Special recognition
M3lcryptNot accepted---
MakwaSpecial recognition
MCS_PHSDiscarded--
Omega CryptDiscarded--
ParallelDiscarded-
PolyPassHashDiscarded--
POMELODiscarded-
PufferfishDiscarded-
RIGDiscarded--
SchvrchDiscarded--
TortugaDiscarded--
TwoCatsDiscarded--
YarnDiscarded--
yescryptSpecial recognition

CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness, Europe)

In 2012, a competition was announced and opened a year later for new algorithms capable of providing authenticated encryption. Developments in this area have shown some weaknesses associated with AE (Autenticated Encryption) and AEAD (Authenticated Encryption with Associated Data). This means encryption where it is possible to prove not only confidentiality, but also authenticity, i.e. who encrypted this data. This competition was closed in 2019, but its results did not come to fruition in the form of a standard. The competition itself is difficult to read. Nevertheless, the winner of this competition also won the NIST LWC competition. The CAESAR project list is here:

AlgorithmSubmissionRound 1Round 2Round 3Round 4Round 5Finalist
++AE1st round-----
ACORN2nd place / 1st use case
AEGIS-128------
AEGIS-128L1st place / 2nd use case
AEGIS-2561st place / 2nd use case
AES-CMCC1st round-----
AES-COBRAWithdrawn-----
AES-COPACOLM2st place / 3rd use case
AES-CPFB1st round-----
AES-OTR---AES-OTR--
AEZ---AEZ--
Artemia1st round-----
ASCON1st place / 1st use case
Avalanche1st round-----
CalicoWithdrawn-----
CBA1st round-----
CBEAMWithdrawn-----
CLOC and SILC---CLOC and SILC--
DEOXYS-I---DEOXYS-II1st place / 3rd use case
ElmDCOLM2st place / 3rd use case
Enchilada1st round-----
FASERWithdrawn-----
HKCWithdrawn-----
HS1-SIV--HS1-SIV---
ICEPOLE--ICEPOLE---
iFEED1st round-----
iSCREAM1st round-----
JAMBU---JAMBU--
Joltik--Joltik---
Julius1st round-----
Ketje---Ketje--
Keyak---Keyak--
KIASU1st round-----
LAC1st round-----
MarbleWithdrawn-----
McMamboWithdrawn-----
Minalpher--Minalpher---
MORUS2st place / 2nd use case
NORX---NORX
OCN
OMD--OMD---
PAEQ--PAEQ---
PAESWithdrawn-----
PANDAWithdrawn-----
POET--POET---
POLAWIS1st round-----
PRIMATEs--PRIMATEs---
Prøst1st round-----
Raviyoyla1st round-----
Sablier1st round-----
SCREAM--SCREAM---
SHELL--SHELL---
STRIBOB--STRIBOB---
Tiaoxin---Tiaoxin--
TriviA-ck--TriviA-ck---
Wheesht1st round-----
YAES1st round-----
Π-Cipher--Π-Cipher---

Japan

Japan has its own standardisation structure. It uses the CRYPTREC panel for selection, which also takes into account standards of other countries.

CRYPTREC (Cryptography Research and Evaluation Committees, Japan)

This is a Japanese commission that carried out the evaluation of mechanisms for the first time in 2003. This activity was repeated in 2013 and 2023 (it seems that every 10 years). The results of the evaluation of the individual encryption algorithms are published and create binding rules for the Japanese market. Moreover, the Camellia algorithm (one of the winners) is internationally accepted and partially accelerable using AES-NI instructions. The full list is here:

2003 2013 2023
Digital signature DSA DSA DSA
ECDSA ECDSA ECDSA
RSASSA-PKCS1v1.5 RSASSA-PKCS1v1.5 RSASSA-PKCS1v1.5
RSA-PSS RSA-PSS RSA-PSS
Key exchange RSA-OAEP RSA-OAEP RSA-OAEP
RSAES-PKCS1-V1.5
Key agreement DH DH DH
ECDH ECDH ECDH
PSEC-KEM
Block cipher 64b CIPHERUNICORN-E
Hierocrypt-L1
MISTY1
3-key Triple DES 3-key Triple DES 3-key Triple DES
Block cipher 128b AES AES AES
Camellia Camellia Camellia
CIPHERUNICORN-A
Hierocrypt-3
SC2000
Block cipher mode CBC CBC
CFB CFB
CTR CTR
OFB OFB
AEAD mode CCM CCM
GCM GCM
Stream cipher MUGI Kcipher-2 Kcipher-2
MULTI-S01
128-bit RC4
Integrity protection CMAC CMAC
HMAC HMAC
Identity verification ISO/IEC 9798-2 ISO/IEC 9798-2
ISO/IEC 9798-3 ISO/IEC 9798-3
Hash RIPEMD-160
SHA-1
SHA-256 SHA-256 SHA-256
SHA-384 SHA-384 SHA-384
SHA-512 SHA-512 SHA-512
PRNG / CSPRNG ANSI X9.42-2001 Annex C.1 based on SHA1
FIPS 186-2 Appendix 3.1 based on SHA1
FIPS 186-2 revised Appendix 3.1 based on SHA1

South Korea

Standardization in South Korea has taken a different path. This country is trying to promote its technologies through products manufactured on its market, while also supporting generally accepted standards. For this reason, the products of their companies also support the national algorithms ARIA (cooperation of security forces and academia) and SEED (security forces). Both of these algorithms are part of e.g. SSL/TLS. In addition to these algorithms, KpQC standardization for quantum computer-resistant cryptography is currently running, which is led by the world's leading experts.

KpqC competition (Korea Post Quantum Cryptography competition, South Korea)

This is an ongoing competition to select the corresponding algorithms for quantum computer-resistant cryptography. More about the algorithms that are part of the above selections in article

Russia

The Russian Federation still maintains the GOST standards (государственный стандарт / gosudarstvennyi standard) from the time of the Union of Soviet Socialist Republics. This is a set of standards originally corresponding to the requirements of the Soviet Union and to some extent the members of the RVHP group, currently rather the Euro-Asian Council for Standardization, Metrology and Certification, which operates within the Commonwealth of Independent States (CIS) and the Euro-Asian Economic Union (EAEU). At the moment there are standards, but I am not aware of any competitions in this area. Here, too, algorithms such as AES and others are accepted. Of interest in this area is the Magma algorithm, which is a peer of the DES algorithm.

StandardGoalName
GOST 34.10–2018DSA
GOST 34.11–2018HashStreebog
GOST 34.12–2018Block cipherMagma, Kuznyechik
GOST 34.13–2018Block cipher modes of operationECB, CTR, OFB, CBC, CFB, MAC (CMAC/OMAC)

India

India is planning a fairly extensive cryptography program, but unfortunately I have not been able to find any information regarding specific competitions if they are taking place. Roadmap is available here.

China

The ShāngMì family algorithms were designed and developed at the Center for Secure Communication at the Chinese Academy of Science (CAS) and the Cryptography Testing Center (Commercial Cryptography Testing Center, National Cryptography Administration). The goal was to design appropriate methods for security of communication with authentication for networks using SSL/TLS and WiFi networks, where a possible backdoor in existing technologies was a concern. At least some of these algorithms were declassified in approximately 2006 and became national standards in 2016.
I have added two algorithms to this list that do not belong here. These are ZUC algorithms, used in 3G/4G/5G networks and standardized 3GPP, as well as the SSFF3 algorithm. The ShāngMì family together with these algorithms is thus currently used in a wide range of applications, from WiFi, TLS, via access cards, communication with GPS Beida, mobile networks and possibly in other, special applications.

Name Algorithm typeDetails Standardization
SM1/SCB2 Block block=128b, key=128b
SM2 ECC curve 256b, eqivalent of NIST P256 GM/T 0003, GB/T 32918, RFC 8998
SM3 Hash output 256b, eqivalent of SHA256 GM/T 000č, GB/T 32905, RFC 8998
SM4 Block block=128b, key=128b, equivalent of AESGM/T 0002, GB/T 32907, RFC 8998
SM7 Block block=64b, key=128b
SM9 ECC curve 256b, eqivalent of NIST P256 ISO/IEC 11770-3, ISO/IEC 14888-3, ISO/IEC 18033-5,
IEEE 1363.3, GM/T 0044-2016, RFC 6508
ZUC/Zu Chongzhi Block Key=128b GM/T 0001-2016, 3GPP 35.222
SSFF3 Block

CACR PQC standardization (China Association for Cryptography Research: Post Quantum Cryptography standardization) and CACR cryptography standardization (China Association for Cryptography Research: Cryptography standardization)

In January 2020, Chinese standards dedicated to quantum computer-resistant cryptography were published. At the same time, new symmetric algorithms were published. This material describes both symmetric and quantum computer-resistant algorithms. More about the quantum computer-resistant algorithms that are part of this selection can be found in article.


CACR cryptography standardization (China Association for Cryptography Research: Cryptography standardization)

China is trying to demonstrate its independence in this area as well. Recently, I came across information that Russia should be interested in cooperating on this development, but the information is scarce and difficult for me to read. More information about the competition can be found at:
CACR cryptography standardization


Second group: uBlock, Ballet, FESH, ANT, TANGRAM, RAINDROP, NBC, FBC, SMBA, SPRING

AlgorithmResult
ANTElected
BalletElected
BTWDiscard
CFEDiscard
CSEDiscard
FBCElected
FESHElected
FluxDiscard
JieAnDiscard
NBCElected
PilotDiscard
QDiscard
RaindropElected
SMBAElected
SPRINGElected
SWANDiscard
TANGRAMElected
TASS1Discard
TASS2Discard
TULIPDiscard
TYBDiscard
uBlockElected

References:

  1. DES: Data Encryption Standard (FIPS-46)
    Source: https://www.nist.gov/
  2. TDES: Triple Data Encryption Standard (FIPS-46-3)
    Source: https://www.nist.gov/
  3. NIST to Withdraw Special Publication 800-67 Revision 2
    Source: https://www.nist.gov/
  4. SHA/SHA-0 - Secure Hash Function (FIPS-180)
    Source: https://www.nist.gov/
  5. SHA-1 - Secure Hash Function (FIPS-180-1)
    Source: https://www.nist.gov/
  6. SHA-2 - Secure Hash Function (FIPS-180-2)
    Source: https://www.nist.gov/
  7. AES Competition
    Source: https://www.nist.gov/
  8. AES: Advanced Encryption Standard (FIPS-197)
    Source: https://www.nist.gov/
  9. The Economic Impacts of the Advanced Encryption Standard, 1996-2017
    Zdroj: https://www.nist.gov/
  10. SHA-2 - Secure Hash Function (FIPS-180-4)
    Source: https://www.nist.gov/
  11. SHA-3 - Secure Hash Function (FIPS-202)
    Source: https://www.nist.gov/
  12. LWC: Lightweight Cryptography
    Source: https://www.nist.gov/
  13. PQC: PostQuantum Cryptography
    Source: https://www.nist.gov/
  14. NESSIE: New European Schemes for Signatures, Integrity, and Encryption
    Source: http://www.cosic.esat.kuleuven.be/
  15. eSTREAM: ECRYPT Stream Cipher Project
    Source: http://www.ecrypt.eu.org/stream/
  16. PHC: Password Hashing Competition
    Source: https://www.password-hashing.net/
  17. CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness
    Source: https://competitions.cr.yp.to/
  18. RTTG: Russian GOST database
    Zdroj: https://www.russiangost.com/
  19. Cryptography Roadmap of India
    Source: https://www.meity.gov.in/
  20. Korea Post-Quantum Cryptography competition
    Source: https://kpqc.or.kr/
  21. CACR cryptography standardization
    Source: https://www.cacrnet.org.cn/
  22. CQCR PQC standardization
    Source: https://www.cacrnet.org.cn/
  23. CRYPTREC: Cryptography Research and Evaluation Committees
    Source: https://www.cryptrec.go.jp/en/

Autor článku:

Jan Dušátko
Jan Dušátko

Jan Dušátko has been working with computers and computer security for almost a quarter of a century. In the field of cryptography, he has cooperated with leading experts such as Vlastimil Klíma or Tomáš Rosa. Currently he works as a security consultant, his main focus is on topics related to cryptography, security, e-mail communication and Linux systems.

1. Introductory Provisions

1.1. These General Terms and Conditions are, unless otherwise agreed in writing in the contract, an integral part of all contracts relating to training organised or provided by the trainer, Jan Dušátko, IČ 434 797 66, DIČ 7208253041, with location Pod Harfou 938/58, Praha 9 (next as a „lector“).
1.2. The contracting parties in the general terms and conditions are meant to be the trainer and the ordering party, where the ordering party may also be the mediator of the contractual relationship.
1.3. Issues that are not regulated by these terms and conditions are dealt with according to the Czech Civil Code, i.e. Act No.89/2012 Coll.
1.4. All potential disputes will be resolved according to the law of the Czech Republic.

2. Creation of a contract by signing up for a course

2.1. Application means unilateral action of the client addressed to the trainer through a data box with identification euxesuf, e-mailu with address register@cryptosession.cz or register@cryptosession.info, internet pages cryptosession.cz, cryptosession.info or contact phone +420 602 427 840.
2.2. By submitting the application, the Client agrees with these General Terms and Conditions and declares that he has become acquainted with them.
2.3. The application is deemed to have been received at the time of confirmation (within 2 working days by default) by the trainer or intermediary. This confirmation is sent to the data box or to the contact e-mail.
2.4. The standard time for registration is no later than 14 working days before the educational event, unless otherwise stated. In the case of a natural non-business person, the order must be at least 28 working days before the educational event.
2.5. More than one participant can be registered for one application.
2.6. If there are more than 10 participants from one Client, it is possible to arrange for training at the place of residence of the intermediary or the Client.
2.7. Applications are received and processed in the order in which they have been received by the Provider. The Provider immediately informs the Client of all facts. These are the filling of capacity, too low number of participants, or any other serious reason, such as a lecturer's illness or force majeure. In this case, the Client will be offered a new term or participation in another educational event. In the event that the ordering party does not agree to move or participate in another educational event offered, the provider will refund the participation fee. The lack of participants is notified to the ordering party at least 14 days before the start of the planned term.
2.8. The contract between the provider and the ordering party arises by sending a confirmation from the provider to the ordering party.
2.9. The contract may be changed or cancelled only if the legal prerequisites are met and only in writing.

3. Termination of the contract by cancellation of the application

3.1. The application may be cancelled by the ordering party via e-mail or via a data mailbox.
3.2. The customer has the right to cancel his or her application for the course 14 days before the course takes place without any fees. If the period is shorter, the subsequent change takes place. In the interval of 7-13 days, an administrative fee of 10% is charged, cancellation of participation in a shorter interval than 7 days then a fee of 25%. In case of cancellation of the application or order by the customer, the possibility of the customer's participation in an alternative period without any additional fee is offered. The right to cancel the application expires with the implementation of the ordered training.
3.3. In case of cancellation of the application by the trainer, the ordering party is entitled to a full refund for the unrealized action.
3.4. The ordering party has the right to request an alternative date or an alternative training. In such case, the ordering party will be informed about all open courses. The alternative date cannot be enforced or enforced, it depends on the current availability of the course. If the alternative training is for a lower price, the ordering party will pay the difference. If the alternative training is for a lower price, the trainer will return the difference in the training prices to the ordering party.

4. Price and payment terms

4.1. By sending the application, the ordering party accepts the contract price (hereinafter referred to as the participation fee) indicated for the course.
4.2. In case of multiple participants registered with one application, a discount is possible.
4.3. The participation fee must be paid into the bank account of the company held with the company Komerční banka č. 78-7768770207/0100, IBAN:CZ5301000000787768770207, BIC:KOMBCZPPXXX. When making the payment, a variable symbol must be provided, which is indicated on the invoice sent to the client by the trainer.
4.4. The participation fee includes the provider's costs, including the training materials. The provider is a VAT payer.
4.5. The client is obliged to pay the participation fee within 14 working days of receipt of the invoice, unless otherwise stated by a separate contract.
4.6. If the person enrolled does not attend the training and no other agreement has been made, his or her absence is considered a cancellation application at an interval of less than 7 days, i.e. the trainer is entitled to a reward of 25% of the course price. The overpayment is returned within 14 days to the sender's payment account from which the funds were sent. Payment to another account number is not possible.
4.7. An invoice will be issued by the trainer no later than 5 working days from the beginning of the training, which will be sent by e-mail or data box as agreed.

5. Training conditions

5.1. The trainer is obliged to inform the client 14 days in advance of the location and time of the training, including the start and end dates of the daily programme.
5.2. If the client is not a student of the course, he is obliged to ensure the distribution of this information to the end participants. The trainer is not responsible for failure to comply with these terms and conditions.
5.2. By default, the training takes place from 9 a.m. to 5 p.m. at a predetermined location.
5.3. The trainer can be available from 8 a.m. to 9 a.m. and then from 17 a.m. to 6 p.m. for questions from the participants, according to the current terms and conditions.
5.4. At the end of the training, the certificate of absorption is handed over to the end users.
5.5. At the end of the training, the end users evaluate the trainer's approach and are asked to comment on the evaluation of his presentation, the manner of presentation and the significance of the information provided.

6. Complaints

6.1. If the participant is grossly dissatisfied with the course, the trainer is informed of this information.
6.2. The reasons for dissatisfaction are recorded in the minutes in two copies on the same day. One is handed over to the client and one is held by the trainer.
6.3. A statement on the complaint will be submitted by e-mail within two weeks. A solution will then be agreed within one week.
6.4. The customer's dissatisfaction may be a reason for discontinuing further cooperation, or financial compensation up to the price of the training, after deduction of costs.

7. Copyright of the provided materials

7.1. The training materials provided by the trainer in the course of the training meet the characteristics of a copyrighted work in accordance with Czech Act No 121/2000 Coll.
7.2. None of the training materials or any part thereof may be further processed, reproduced, distributed or used for further presentations or training in any way without the prior written consent of the trainer.

8. Liability

8.1. The trainer does not assume responsibility for any shortcomings in the services of any third party that he uses in the training.
8.2. The trainer does not assume responsibility for injuries, damages and losses incurred by the participants in the training events or caused by the participants. Such costs, caused by the above circumstances, shall be borne exclusively by the participant in the training event.

9. Validity of the Terms

9.1 These General Terms and Conditions shall be valid and effective from 1 October 2024.

Consent to the collection and processing of personal data

According to Regulation (EU) No 2016/679 of the European Parliament and of the Council on the protection of individuals with regard to the processing of personal data and on the free movement of such data and repealing Directive 95/46/EC (General Data Protection Regulation, hereinafter referred to as "the Regulation"), the processor xxx (hereinafter referred to as "the Controller") processes personal data. Individual personal data that are part of the processing during specific activities at this web presentation and in the course of trade are also broken down.
Although the collection of data is ubiquitous, the operation of this website is based on the right to privacy of each user. For this reason, the collection of information about users takes place to the extent absolutely necessary and only if the user decides to contact the operator. We consider any further collection and processing of data unethical.

Information about the records of access to the web presentation

This website does not collect any cookies. The site does not use any analytical scripts of third parties (social networks, cloud providers). For these reasons, an option is also offered for displaying the map in the form of a link, where the primary source is OpenStreet and alternatives then the frequently used Maps of Seznam, a.s., or Google Maps of Google LLC Inc. The use of any of these sources is entirely at the discretion of the users of this site. The administrator is not responsible for the collection of data carried out by these companies, does not provide them with data about users and does not cooperate on the collection of data.
Logging of access takes place only at the system level, the reason being the identification of any technical or security problems. Other reasons are overview access statistics. No specific data is collected or monitored in this area and all access records are deleted after three months.

Information about contacting the operator of the site

The form for contacting the operator of the site (administrator) contains the following personal data: name, surname, e-mail. These data are intended only for this communication, corresponding to the address of the user and are kept for the time necessary to fulfil the purpose, up to a maximum of one year, unless the user determines otherwise.

Information about the order form

In case of an interest in the order form, the form contains more data, i.e. name, surname, e-mail and contact details for the organisation. These data are intended only for this communication, corresponding to the address of the user and are kept for one year, unless the user determines otherwise. In the event that a business relationship is concluded on the basis of this order, only the information required by Czech law on the basis of business relations (company name and address, bank account number, type of course and its price) will continue to be kept by the administrator.

Information about the course completion document

Within the course, a course completion document is issued by the processor. This document contains the following data: student's name and surname, the name and date of the course completion and the employer's name. The information is subsequently used for the creation of a linear hash tree (non-modifiable record). This database contains only information about the provided names and company names, which may or may not correspond to reality and is maintained by the processor for possible re-issuance or verification of the document's issuance.

Rights of the personal data subject

The customer or visitor of this website has the possibility to request information about the processing of personal data, the right to request access to personal data, or the right to request the correction or deletion of any data held about him. In the case of deletion, this requirement cannot be fulfilled only if it is not data strictly necessary in the course of business. The customer or visitor of this website also has the right to obtain explanations regarding the processing of his personal data if he finds out or believes that the processing is carried out in violation of the protection of his private and personal life or in violation of applicable legislation, and the right to request removal of the resulting situation and to ensure the correction.
Furthermore, the customer/visitor of this website may request restriction of processing or object to the processing of personal data and has the right to withdraw his/her consent to the processing of personal data at any time in writing, without prejudice to the lawfulness of their processing prior to such withdrawal. For this purpose, the contact e-mail address support@cryptosession.cz is used.
The customer/visitor has the right to file a complaint against the processing of personal data with the supervisory authority, which is the Office for Personal Data Protection.