Homework 1


Part I

due Wednesday, September 13, 2006

Re: Lecture 0 - Overview of Project Topics

For each of the THREE topics you are potentially interested in:

Prepare a list of 10 most relevant references arranged in the logical top-down order starting from the most broad general picture, and ending with the detailed view of the problem to be solved.

If possible each list should include at least one instance of each of the following types of references: book chapter, journal article, conference article, white paper, web site, standard, MS Thesis, ECE 646 project report from previous years, etc.

Please use a format of references recommended in the Microsoft Word Template for the Preparation of Papers for IEEE Transactions and Journals.

Please, submit your three lists in the MS Word format using WebCT.


Part II

due Wednesday, September 20, 2006

Re: Lecture 1 - Advanced Encryption Standard Contest

Required reading

Get familiar with the webpages

Read selected chapters from the following reports to the extent necessary to perform tasks formulated in Problem 1.

  1. NIST's Report on the Development of the Advanced Encryption Standard (AES), available at http://csrc.nist.gov/encryption/aes/
  2. "Hardware performance of the AES finalists - survey and analysis of results," by Kris Gaj and Pawel Chodowiec, available at http://ece.gmu.edu/crypto/publications.htm

  3. NESSIE: Methodology for Comparing the Performance of Primitives on a Fair and Equal Basis, available at

  4. NESSIE: Description of Methodology for Security Evaluation, available at

  5. Lejla Batina, Sandeep Kumar, Joseph Lano, Kirstin Lemke, Nele Mentens, Christof Paar, Bart Preneel, Kazuo Sakiyama and Ingrid Verbauwhede, "Testing Framework for eSTREAM Profile II Candidates", available at

  6. Christophe De Cannière, "eSTREAM testing framework," available at

Problem 1 (15 points)

Write a technical paper (12 pages maximum, 11 pt font minimum) describing

    - similarities and differences between the AES, NESSIE, and eSTREAM contests in terms of

  • security

  • performance in software

  • performance in hardware

  • other factors

Please, submit your report in the PDF or MS Word format using WebCT.

Additional reading (not required, but might be helpful):

  1. Miles Smid , "A Strategy for Analyzing Public Comments and Preparing the Round 2 Status Report," and "AES Issues," available at http://csrc.nist.gov/encryption/aes/round2/pubcmnts.htm
  2. Bruce Schneier, Doug Whiting, "A Performance Comparison of the Five AES Finalists," available at http://csrc.nist.gov/encryption/aes/round2/conf3/aes3papers.html