Feeds

Belgians win US encryption standard contest

Will this make it easier to name 10 famous Belgians?

  • alert
  • submit to reddit

Remote control for virtualized desktops

An encryption algorithm developed by a pair of Belgian researchers is almost certain to be confirmed as the new US security standard.

Called Rijndael, and pronounced "Rhine-Doll" the algorithm is the successor to the Data Encryption Standard that was introduced in 1977.

The algorithm is the winner of the US National Institute of Science and Technology Advanced Encryption Standard contest. The contest has been running for three years and was set up to find a replacement standard for the current US benchmark.

Having won the contest, it is looking pretty good for the algorithm's future as the new US security standard. Provided no-one else comes up with anything better in-house, so to speak.

The Belgium cryptographers are Joam Daemon of Proton World International and Vincent Rijmen of Katholieke Universiteit Leuven. The pair's work was chosen because it showed the best combination of security, performance, efficiency, ease of implementation and flexibility, the institute said.

The US Commerce Secretary Norman Mineta commented: "This is a very significant step toward creating a more secure digital economy. It will allow e-commerce and e-government to flourish safely, creating new opportunities for all Americans."

Chipzilla added it's two-pennies-worth to the general murmur of comment surrounding the competition, calling it a model of industry and academic co-operation. The chief security architect at Intel, David Aucsmith got a little carried away in his enthusiasm as he gushed: "In all of my experience in the generation of standards, there has never been a more equitable, judicious and timely process."

And the standard US paranoia about foreigners was not a problem in this instance. The complete algorithm and design rationale had been made available to the NSA for the past two years. ®

Choosing a cloud hosting partner with confidence

More from The Register

next story
Euro Parliament VOTES to BREAK UP GOOGLE. Er, OK then
It CANNA do it, captain.They DON'T have the POWER!
Download alert: Nearly ALL top 100 Android, iOS paid apps hacked
Attack of the Clones? Yeah, but much, much scarier – report
NSA SOURCE CODE LEAK: Information slurp tools to appear online
Now you can run your own intelligence agency
Post-Microsoft, post-PC programming: The portable REVOLUTION
Code jockeys: count up and grab your fabulous tablets
Twitter App Graph exposes smartphone spyware feature
You don't want everyone to compile app lists from your fondleware? BAD LUCK
Microsoft: Your Linux Docker containers are now OURS to command
New tool lets admins wrangle Linux apps from Windows
prev story

Whitepapers

Go beyond APM with real-time IT operations analytics
How IT operations teams can harness the wealth of wire data already flowing through their environment for real-time operational intelligence.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
Why CIOs should rethink endpoint data protection in the age of mobility
Assessing trends in data protection, specifically with respect to mobile devices, BYOD, and remote employees.
Reg Reader Research: SaaS based Email and Office Productivity Tools
Read this Reg reader report which provides advice and guidance for SMBs towards the use of SaaS based email and Office productivity tools.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.