This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
Green Cryptography: Cleaner Engineering through Recycling, Part 2
September/October 2009 (vol. 7 no. 5)
pp. 64-65
Justin Troutman, Extorque Information Security Engineering
Vincent Rijmen, K.U. Leuven
In part 1, we introduced "green cryptography" as a recycling-based paradigm for building mature (secure) and minimalist (simple) cryptographic implementations, using the AES (Advanced Encryption Standard) as our building block. We established that the AES is the poster child for green cryptography, because, as a standard, it receives more cryptanalytical attention than any other block cipher, thus "earning its bones." That, and it can be used with modes of operation for meeting the strongest notions of confidentiality and integrity. In part 2, we further defend our selection of the AES as a prime candidate for recycling, by looking at its underlying design strategy—the wide trail strategy—in the context of security margins—an often misunderstood metric for comparing block ciphers. We show that it's not always as easy as who has the most rounds; it's what's happening inside the round.
Index Terms:
green cryptography, security & privacy, cryptanalysis, wide-trail strategy, security margins, Rijndael, Twofish, Serpent, block cipher
Citation:
Justin Troutman, Vincent Rijmen, "Green Cryptography: Cleaner Engineering through Recycling, Part 2," IEEE Security & Privacy, vol. 7, no. 5, pp. 64-65, Sept.-Oct. 2009, doi:10.1109/MSP.2009.120
Usage of this product signifies your acceptance of the Terms of Use.