Computer Security Resource Center   nistlogo
Home Library Services Events Advisories Contact Site Map  
SEARCH


advanced search

Modes of Operation
 Proposed Modes
 Public Comments
 Workshop 1
 Workshop 2
 Discussion Forum

AES Home Page

Cryptographic Toolkit

Project Sites
 CMVP
 PKI
 Common Criteria
 NIAP
 Security Practices

Publications
 
 

/ Modes / Proposed Modes


Proposed Modes of Operation

NIST has accepted for consideration the modes of operation that are described in the table of proposed modes below. For each proposal, links are given to the available documentation, described in the key below. Within the key, links to the submission guidelines are given to the items that were suggested in the guidelines.

Key for "Available Documentation"

SP

Mode Specification

CD

Code (link to other site)

AD

Additional Documentation

TV

Test Vectors

IP

Intellectual Property Statements

SU

Summary Table or Outline

Mode

Full Mode Name
Submitter(s)

Available
Documentation
2DEM 2D-Encryption Mode
A. A. Belal, M. A. Abdel-Gawad 

SP | AD | IP
CD | TV | SU

ABC Accumulated Block Chaining
L. Knudsen
 

SP | AD | IP
TV | SU

CCM

Counter with CBC-MAC
R. Housley, D. Whiting, N. Ferguson (Posted June 3, 2002)

SP | AD | IP
TV | SU
CTR

Counter Mode Encryption
H. Lipmaa, P. Rogaway, D. Wagner
 

SP | AD | IP
TV | SU

IACBC

Integrity Aware Cipher Block Chaining
C. Jutla
 

SP | AD | IP
TV | SU

IAPM

Integrity Aware Parallelizable Mode
C. Jutla

SP | AD1
AD2 | AD3
IP | TV | SU

IGE

Infinite Garble Extension
V. Gligor, P. Donescu
 

SP | AD | IP
TV | SU

KFB Key Feedback Mode
J. Håstad, M. Naslund
 

SP | AD | IP
TV | SU

OCB Offset Codebook
P. Rogaway

 

SP | AD | IP
CD | TV | SU

PCFB Propagating Cipher Feedback
H. Hellström

 

SP | AD | IP
TV | SU

PMAC

Parallelizable Message Authentication Code
P. Rogaway

 

SP | AD | IP
CD | TV | SU

RMAC Randomized MAC
E. Jaulmes, A. Joux, F. Valette
 

SP | AD | IP
TV | SU

TMAC

Two-Key CBC MAC
K. Kurosawa, T. Iwata
(Posted July 9, 2002)

SP | AD | IP
TV | SU
XCBC
(MAC)
Extended Cipher Block Chaining MAC
J. Black, P. Rogaway
 

SP | AD | IP
TV | SU

XCBC
eXtended Cipher Block Chaining Encryption
V. Gligor, P. Donescu

SP | AD | IP
TV | SU

XECB
(MAC)
eXtended Electronic Code Book MAC
V. Gligor, P. Donescu

 

SP | AD | IP
TV | SU




*AES-
hash
(Hash)
AES-hash 
B. Cohen
SP | AD | IP
TV | SU

* AES-hash as defined in the submission will not be adopted in the current development effort because it requires the Rijndael algorithm with a block size of 256 bits, not 128 bits (as specified in the proposed AES). Rijndael has not been vetted with a block size other than 128 bits. Nevertheless, NIST will consider comments on this proposal and on the issues it raises: whether to develop a hash mode, and whether and how to develop/vet additional variants of the AES.