CAESAR: Competition for Authenticated Encryption: Security, Applicability, and Robustness

CAESAR finalists announced

Ciphers that are suitable for hardware-constrained applications (e.g., IoT). Low-cost implementation (in custom hardware or microcontrollers) prioritized over performance.
Finalists: ACORN, Ascon

Ciphers that are designed to perform fast on modern general purpose computers. Improved replacements for AES-GCM and ChaCha20/Poly1305.
Finalists: AEGIS, MORUS, OCB

Prioritizes security over performance. Notably, both of the finalists for this use case are nonce misuse-resistant.
Finalists: COLM, Deoxys-II

competitions.cr.yp.to/caesar-submissions.html
Discuss.

Attached: DXjF1zCX0AArgXw.jpg large.jpg (2048x1536, 258.34K)

Other urls found in this thread:

en.wikipedia.org/wiki/Authenticated_encryption
cryptopp.com/wiki/Authenticated_encryption
keccak.team/sponge_duplex.html
github.com/pvial00
twitter.com/AnonBabble

I don't know what any of these standards are. And are these standards free-as-in-freedom?

CAESAR (Competition for Authenticated Encryption: Security, Applicability, and Robustness) will identify a portfolio of authenticated ciphers that (1) offer advantages over AES-GCM and (2) are suitable for widespread adoption. Cryptographic algorithm designers are invited to submit proposals of authenticated ciphers to CAESAR. All proposals will be made public for evaluation.
CAESAR is run by the international cryptologic research community. The University of Illinois at Chicago applied to NIST for funding for a "Cryptographic competitions" grant, and is using some of this funding to support CAESAR benchmarking and the Directions in Authenticated Ciphers workshop series.

Thanks for sharing, OP

This makes me sad. What the fuck is COLM and Deoxys-II???? How can they be better than Keccak????
Oh I see now.

they will sell his families organs to the jews if he doesn't win

...

Can we please ban multiple question marks in a row niggers?

XDDDDDDDDDDDDD
ebin, dude

Isn't AES and ChaCha20 theoretically unbreakable? Well, I mean there indeed was an attack that on AES that was more efficient than simply bruteforcing it but I mean was it so bad that it warrants the replacement of the encryption algorithm? What about my GPG encrypted backups online, are they bust?