FACTOID # 5: Minnesota and Connecticut are both in the top 5 in saving money and total tax burden per capita.
 
 Home   Encyclopedia   Statistics   States A-Z   Flags   Maps   FAQ   About 
   
 
WHAT'S NEW
RELATED ARTICLES
People who viewed "Nessie" also viewed:
 

SEARCH ALL

FACTS & STATISTICS    Advanced view

Search encyclopedia, statistics and forums:

 

 

(* = Graphable)

 

 


Encyclopedia > Nessie

NESSIE (New European Schemes for Signatures, Integrity and Encryption) was a European research project funded from 2000–2003 to identify secure cryptographic primitives. The project was comparable to the NIST AES process and the Japanese Government-sponsored CRYPTREC project, but with notable differences from both. In particular, there is both overlap and disagreement between the selections and recommendations from NESSIE and CRYPTREC (as of the August 2003 draft report). The NESSIE participants include some of the foremost active cryptographers in the world, as does the CRYPTREC project. Nessie may refer to: Nessie, the colloquial name for the Loch Ness Monster NESSIE (New European Schemes for Signatures, Integrity and Encryption), a European research project Nessie the Dragon, a mobile ringtone character created by Jamba! Mitsubishi Nessie, a concept automobile Nessie, the nickname of Vanessa Kapatelis, a character in... For other uses, see Europe (disambiguation). ... The German Lorenz cipher machine, used in World War II for encryption of very high-level general staff messages Cryptography (or cryptology; derived from Greek κρυπτός kryptós hidden, and the verb γράφω gráfo write or λεγειν legein to speak) is the study of message secrecy. ... A Cryptographic primitives are well-established cryptographic routines that are frequently used in security-related topics. ... As a non-regulatory agency of the United States Department of Commerce’s Technology Administration, the National Institute of Standards (NIST) develops and promotes measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life. ... On January 2, 1997 the National Institute of Standards and Technology, or NIST, called for cryptographers to propose a new standard block cipher for United States Government use in non_classified but sensitive applications. ... CRYPTREC is the Cryptography Research and Evaluation Committee set up by the Japanese Government to evaluate and recommend cryptographic techniques for government and industrial use. ... Pre-19th century Leone Battista Alberti, polymath/universal genius, inventor of polyalphabetic substitution (see frequency analysis for the significance of this -- missed by most for a long time and dumbed down in the Vigenère cipher), and what may have been the first mechanical encryption aid. ...


NESSIE was intended to identify and evaluate quality cryptographic designs in several categories, and to that end issued a public call for submissions in March 2000. Forty-two were received, and in February 2003 twelve of the submissions were selected. In addition, five algorithms already publicly known, but not explicitly submitted to the project, were chosen as "selectees". The project has publicly announced that "no weaknesses were found in the selected designs". Year 2000 (MM) was a leap year starting on Saturday (link will display full 2000 Gregorian calendar). ... Year 2003 (MMIII) was a common year starting on Wednesday of the Gregorian calendar. ...

Contents

Selected algorithms

The selected algorithms and their submittors or developers are listed below. The five already publicly known, but not formally submitted to the project, are marked with a "*". Most may be used by anyone for any purpose without needing to seek a patent license from anyone; a license agreement is needed for those marked with a "#", but the licensors of those have committed to "reasonable non-discriminatory license terms for all interested", according to a NESSIE project press release.


None of the six stream ciphers submitted to NESSIE were selected since every one fell to cryptanalysis. This surprising result led to the eSTREAM project. The operation of the keystream generator in A5/1, a LFSR-based stream cipher used to encrypt mobile phone conversations. ... eSTREAM is a project to identify new stream ciphers that might become suitable for widespread adoption, organised by the EU ECRYPT network. ...


Block ciphers

In cryptography, MISTY1 (or MISTY-1) is a block cipher designed in 1995 by Mitsuru Matsui and others for Mitsubishi Electric. ... For information on Mitsubishi brand computer monitors, see NEC-Mitsubishi Electronics Display of America Inc. ... In cryptography, Camellia is a block cipher that has been evaluated favorably by several organisations, including the European Unions NESSIE project (a selected algorithm), and the Japanese CRYPTREC project (a recommended algorithm). ... Nippon Telegraph and Telephone (日本電信電話 Nippon Denshin Denwa) is a telephone company that dominates the telecommunication market in Japan. ... SHACAL is a 160-bit block cipher based on the cryptographic hash function SHA-1. ... In cryptography, the Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government. ... As a non-regulatory agency of the United States Department of Commerce’s Technology Administration, the National Institute of Standards (NIST) develops and promotes measurement, standards, and technology to enhance productivity, facilitate trade, and improve the quality of life. ... Federal Information Processing Standards (FIPS) are publicly announced standards developed by the U.S. Federal government for use by all (non-military) government agencies and by government contractors. ... This article is about the block cipher. ...

Public-key encryption

  • ACE Encrypt#: IBM Zurich Research Laboratory
  • PSEC-KEM: Nippon Telegraph and Telephone Corp
  • RSA-KEM*: (draft of ISO/IEC 18033-2)

For other uses, see IBM (disambiguation) and Big Blue. ...

MAC algorithms and cryptographic hash functions

  • Two-Track-MAC: Katholieke Universiteit Leuven and debis AG
  • UMAC: Intel Corp, Univ. of Nevada at Reno, IBM Research Laboratory, Technion Institute, and Univ. of California at Davis
  • CBC-MAC*: (ISO/IEC 9797-1);
  • HMAC*: ( ISO/IEC 9797-1);
  • WHIRLPOOL: Scopus Tecnologia S.A. and K.U.Leuven
  • SHA-256*, SHA-384* and SHA-512*: NSA, (US FIPS 180-2)

The Katholieke Universiteit Leuven (Catholic University of Leuven in English) or in short K.U.Leuven, is the oldest, largest and most prominent university in Belgium. ... UMAC - Wikipedia /**/ @import /skins-1. ... Intel Corporation (NASDAQ: INTC, SEHK: 4335), founded in 1968 as Integrated Electronics Corporation, is an American multinational corporation that is best known for designing and manufacturing microprocessors and specialized integrated circuits. ... The Technion - Israel Institute of Technology (הטכניון - מכון טכנולוגי לישראל) is a university in Haifa, Israel. ... CBC-MAC stands for Cipher Block Chaining Message Authentication Code. ... A keyed-hash message authentication code, or HMAC, is a type of message authentication code (MAC) calculated using a cryptographic hash function in combination with a secret key. ... “ISO” redirects here. ... The initials IEC can stand for: Independent Electoral Commission Industrial Emergency Council Inertial electrostatic confinement (in fusion energy) Institut des Experts-comptables et des Conseils fiscaux Institut dEstudis Catalans, Catalan Studies Institute Interactive Evolutionary Computation International Education Centre International Electrical Congress International Electrotechnical Commission See also IEC connector for... This article is about the water movement. ... The SHA (Secure Hash Algorithm) family is a set of related cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). ... The SHA (Secure Hash Algorithm) family is a set of related cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). ... The SHA (Secure Hash Algorithm) family is a set of related cryptographic hash functions designed by the National Security Agency (NSA) and published by the National Institute of Standards and Technology (NIST). ... NSA can stand for: National Security Agency of the USA The British Librarys National Sound Archive This page concerning a three-letter acronym or abbreviation is a disambiguation page — a navigational aid which lists other pages that might otherwise share the same title. ...

Digital signature algorithms

  • ECDSA#: Certicom Corp
  • RSA-PSS: RSA Laboratories
  • SFLASH: Schlumberger Corp (SFLASH was broken in 2007 and should not be used anymore).

Elliptic Curve DSA (EC-DSA) is a variant of the Digital Signature Algorithm which operates on elliptic curve groups. ... RSA-PSS is a new signature scheme that is based on the RSA cryptosystem and provides increased security assurance. ... RSA Security is a NASDAQ-traded public company. ...

Identification schemes

  • GPS-auth: Ecole Normale Supérieure, France Télécom, and La Poste

Project contractors

The contractors and their representatives in the project were:

The Katholieke Universiteit Leuven (Catholic University of Leuven in English) or in short K.U.Leuven, is the oldest, largest and most prominent university in Belgium. ... Bart Preneel is a Belgian cryptographer and cryptanalyst. ... Alex Biryukov is a cryptographer, currently an assistant professor at the University of Luxembourg. ... See also École Normale de Musique de Paris. ... Jacques Stern making a speech before receiving the CNRS gold medal Jacques Stern (born 1949) is a cryptographer, currently a professor at the École Normale Supérieure, where he is Director of the Computer Science Laboratory. ... University Logo Royal Holloway, University of London is a college of the University of London located in Egham, Surrey, England. ... Website http://www. ... Sean Murphy is a cryptographer, currently a professor at Royal Holloway, University of London. ... The Technion - Israel Institute of Technology (הטכניון - מכון טכנולוגי לישראל) is a university in Haifa, Israel. ... Eli Biham is an Israeli cryptographer and cryptanalyst, currently a professor at the Technion Israeli Institute of Technology Computer Science department. ... Dr. Orr Dunkelman (December 1980-) (Ph. ... It has been suggested that this article or section be merged with Catholic University of Leuven (french-speaking). ... Jean-Jacques Quisquater is a cryptographer and a professor at Université catholique de Louvain. ... The University of Bergen (Universitetet i Bergen) is located in Bergen, Norway. ... Lars R. Knudsen Lars Ramkilde Knudsen (born February 21, 1962) is a Danish researcher in cryptography, particularly interested in the design and analysis of block ciphers, hash functions and message authentication codes (MACs). ...

See also

ECRYPT (European Network of Excellence for Cryptology) is a 4-year European research initiative launched on 1 February 2004. ...

External links

  • The homepage of the NESSIE project

  Results from FactBites:
 
Loch Ness Monster, Nessie (2671 words)
Columba apparently converted Nessie, too; for it is said that until he went out on the waters and soothed the beast, she had been a murderess.
In 2007, it was estimated that Nessie tourism brought in an estimated £6 million ($12.2 million) to the Highlands.
Whatever Nessie turns out to be, it is very unlikely that she is a plesiosaur.
"Nessie: Legend of the Loch" by Deborah O'Toole (2452 words)
Nessie is said to have a long neck with a dinosaur-like head, a humped back, flippers and reptilian dark gray skin; her estimated length is anywhere between fifteen and forty feet, with a weight of up to 2,500 pounds.
Nessie has been touted as an imaginative endeavor to attract tourists to the Inverness area, or as a bona fide lake monster with a variety of corroborating photographs to prove it.
However, the legend of Nessie is not taken seriously by most mainstream scientists and other skeptics, although sightings by a large number of reliable resources seem to lend some validity to the claims of her existence.
  More results at FactBites »

 
 

COMMENTARY     


Share your thoughts, questions and commentary here
Your name
Your comments

Want to know more?
Search encyclopedia, statistics and forums:

 


Press Releases |  Feeds | Contact
The Wikipedia article included on this page is licensed under the GFDL.
Images may be subject to relevant owners' copyright.
All other elements are (c) copyright NationMaster.com 2003-5. All Rights Reserved.
Usage implies agreement with terms, 1022, m