2022 Kientzler Catalog

Total Page:16

File Type:pdf, Size:1020Kb

2022 Kientzler Catalog TRIOMIO – COLOR COMBOS WITH UNIFORM PERFORMANCESRMANCES The consumer's enthusiasm for these trendy, three-coloured combos remains extremely strong! SSUPERCALUPERCAL BIDENS BIDENSBIDENS DUO CYPERUS TRIOMIO SUPERCAL ‘Summer Sensation’ TRIOMIO ‘Tweety Pop’ Bidens Duo ‘Sunshine’ ‘Southern‘Southehern Blues’BBlues’ No. 7298: SUPERCAL No. 7210: Bidens ‘Tweety’, No. 7318: Bidens ‘Sweetie’ No. 7363: Cyperus ‘Cleopatra’, ‘Blue’, ‘Light Yellow’ and ‘Pink’ Verbena VEPITA™ ‘Blue Violet’ and ‘Scarlet’ and ‘Funny Honey’ SURDIVA® ‘Blue Violet’ and SURDIVA® ‘White’ CCALIBRACHOAALIBRACHOA PPOCKETOCKET™ CALIBRACHOACALIBRACHOA UNIQUEUNIQQUE CALENDN ULA Calibrachoa POCKET™ ‘Mini Zumba’ TRIOMIO ‘Zumba’ TRIOMIO ‘Mango Punch’ TRIOMIO CALENDULA ‘Color me Spring’ No. 6981: CALIBRACHOA POCKET™ No.o. 7217:: CaCalibrachoa a oa UNIQUEU QU No.o. 7311: Calibrachoa UNIQUE ‘Mango Punch’, No. 7236: Calendula ‘Power Daisy’, ‘Yellow’, ‘Blue’ and ‘Red’ ‘Golden‘Golden Yellow’, ‘Lilac’‘Lilac’ and ‘Dark‘Dark Red’Red’ ‘Golden Yellow’ and ‘Dark Red’ Calibrachoa ‘Lilac’ and ‘Dark Red’ NEMENEMESISIA SUS PERCAL TRIOMIO NESSIE PLUS ‘Alegria’ TRIOMIO BABYCAKE ‘Little Alegria’rii’a’ TRIOMIO SUPERCAL TRIOMIO SUPERCAL ‘Garden Magic’ No. 7200: Nemesia NESSIE PLUS No. 7202: Nemesia BABYCAKE ‘Little Coco’, No. 7221: SUPERCAL ‘Blushing Pink’, No. 7234: SUPERCAL ‘Light Yellow’, ‘White’, ‘Yellow’ and ‘Red’ ‘Little Banana’ and ‘Little Cherry’ ‘Cherryh Improved’ and ‘Dark Blue’ ‘Blue’ and ‘Cherry Improved’ SUPERCAL PREMIUM VEERBR ENENAA VEPPITA™ TRIOMIO SUPERCAL PREMIUM ‘Magic’ TRIOMIO SUPERCAL PREMIUM TRIOMIO SUPERCAL PREMIUM ‘Bonfire’fi ’ TRIOMIO VEPITA™ ‘Fireworks’ No. 7124: SUPERCAL PREMIUM ‘Bordeaux’, ‘Autumn Spice’ - No. 7360: SUPERCAL No. 7359: SUPERCAL PREMIUM ‘Cinnamon’, No. 7213: Verbena VEPITA™ ‘Caramel Yellow’ and ‘Sunray Pink’ PREMIUM ‘Cinnamon’ and ‘French Vanilla’ ‘French Vanilla’ and ‘Caramel Yellow’ ‘Blue Violet’, ‘Scarlet’ and ‘White’ 2 | KIENTZLER 2022 NORTH AMERICA HIGHLIGHTS 2022 Longevity of flowering Fashionable Novelties Garden performer Flamenco ‘Senorita Pink’ ‘Yellow Sun’ ‘Sunset Orange’ ‘Pearl White’ ‘Purple Dawn’ Calibrachoa Catharanthustharanthus Petunia Supercal Premium Soiree® Kuyamba `pagepage 54 `page 59 `page 25 ® NORTH AMERICA 2022 KIENTZLER | 3 INDEX Kientzler Kientzler COMPONENT PLANTS SAKATA Ageratum 5 Alternanthera 32 Angelonia ANGELISSA 48 Hanging basket Argyranthemum 5 Artemisia 32 Calibrachoa CALIPETITE 48 Begonia BELLECONIA™ 6 Cyperus 32 Coleus 49 Begonia SUMMERWINGS™ Double 6 Eupatorium 32 Crossandra 49 Pot/Container Begonia SUMMERWINGS™ 7 Glechoma 32 Gomphrena 49 Begonia SUMMERWINGS™ Elegance 7 Helichrysum 32 Impatiens SUNPATIENS 50-52 Bidens / Bidens BEEZAR! 8 Lysimachia 33 Lantana SUNDANCE 53 Calibrachoa POCKET™ / UNIQUE 9 Muehlenbeckia 33 Mecardonia 53 Growth Coleus 10 Plectranthus 33 Petunia SUPERCAL PREMIUM 54 Coleus UNDER THE SEA / TERRA NOVA 11 Sedum 33 Petunia x Calibrachao SUPERCAL 55 Compact Calendula POWERDAISY 12 Senecio 33 Cosmos 12 Vinca Major 33 SUNTORY Medium Cuphea 12 Angelonia SUNGELONIA® 56 Digitalis 12 Kientzler HERBS 34-35 Argyranthemum GRANDAISY® 56 Vigorous Dahlia DREAMY™ / MERMAID 13 Bracteantha 56 Dahlia MYSTIC / PAINTER 14 Kientzler PERENNIAL Bidens BEEDANCE® 57 Felicia 15 Achillia 36 Brachyscome SURDAISY® 57 Fuchsia STANDUP 15 Agastache 36 Calibrachoa MILLION BELLS® 58 Earliness Gaura 16 Aster Kickin 36 Catharanthus SOIREE® Double 58 Early Gomphrena 16 Ajuga 37 Catharanthus SOIREE® Flamenco 59 Heliotropium 16 Buddleja 37 Catharanthus SOIREE® KA-WA-I-I 59 Medium Early Lobelia LOBELIX 16 Calendula hybrid WINTER WONDERS© 37 Diascia SUNDIASCIA® 60 Nemesia KAROO 16 Caryopteris 37 Fuchsia ANGEL EARRINGS® 60 Medium Nemesia NESSIE UP / NESSIE PLUS 17 Ceratostigma 37 Lobelia 60 Nemesia FAIRY KISSES™ / BABYCAKE 18 Chelone iyonii 37 Lophospermum LOFOS® 61 Late NGI PARADISE Rokoko 19 Clematis 37 Pericallis SENETTI® Sparkle 61 NGI PARADISE / PARADISE SELECT 20-22 Delosperma WHEELS OF WONDER© 38 Pericallis BABY SENETTI® 61 NGI PAINTED PARADISE 22 Euphorbia 38 Pericallis SENETTI® 62 NGI PURE BEAUTY 23 Gypsophila 38 Petunia SURFINIA® Heavenly Cabernet 63 Flower Size Osteospermum SUMMERSMILE 24 Heuchera HEUREKA 39 Petunia SURFINIA® XXL Taffy Pink 63 Petunia KUYAMBA 25 Hedera 40-41 Petunia MOONLIGHT ECLIPSE® 63 Petunia 25 Heliopsis 42 Petunia SURFINIA® 63 Petunia VERANDA 26 Helianthus 42 Petunia SURFINIA® HEARTBEAT 63 Petunia VERANDA Compact Double 27 Helichrysum 42 Petunia SURFINIA® MOUNDING 63 Petunia VERANDA Double 27 Hypericum 42 Petunia SURFINIA® Purple Heart 63 Daylength neutral Petunia VERANDA DESIGNER 28 Iberis 42 Petunia SURFINIA® SUMO 64 Petunia VERANDA Pink Panther 28 Lamium 42 Petunia SURFINIA® SUMMER DOUBLE 64 COLLE Petunia Glamouflage 28 Lamiastrum 43 Petunia SURFINIA® 65 CTION NORTH AMERICA Plectranthus 29 Lavandula 43 Scaevola SURDIVA® 66 KIENTZLER Salvia / Salvia Candle 29 Lysimachia 43 Torenia SUMMER WAVE® BOUQUET 66 20222 Salvia SAUCY 30 Mazus reptans 43 Torenia SUMMER WAVE® TRAILING 66 ta Rica S.A. InnovaPlant9-4150 de Costa Rica S.A. P.O. Box La Evita 30 43 67 Sarchi Norte, Finca La Evita Sanvitalia Muehlenbeckia Verbena TAPIEN® Costa Rica 956 506 2454 4956 Phone + m 506 2454 4242 Fax + th-america.co 30 43 67 www.kientzler-north-america.com Scabiosa Nepeta Verbena TEMARI® PATIO / TRAILING Helianthus ‘Suncatcher’ Sutera EVEREST 30 Perovskia 44 SUNTORY Combinations 68-69 Verbena bonariensis 30 Penstemon Pentastic 44 Verbena VEPITA™ 31 Penstemon 44 Broker & Service 70-71 Senecio ‘Winter Whispers’ Hedera Phlox BAMBINI 44 ‘Luzii’ Salvia FEATHERS 45 Salvia / Salvia officinalis / Salvia VIBE 45 Sedum 46 Front cover: Bidens ‘Spicy Electric White’ Tiarella 46 (Ìpage 8), Petunia VERANDA ‘Red Improved’ Veronica 46 (Ìpage 26). Back cover: Senecio ‘Winter Whispers’ (Ìpage 33), Hedera ‘Luzii’(Ìpage 41) Kientzler WOODLAND 47 and Helianthus ‘Suncatcher’ (Ìpage 42). ® 4 | KIENTZLER 2022 NORTH AMERICA AGERATUM ARGYRANTHEMUM AGGERRATUUMM Scan More vigorous and with me! broader leaves, the variety ‘Parc Majorelle’ works well as solitary specimen in border plantings. FindF out about Ageratum houstonianum ‘Parc Majorelle’ - No. 5328: Ageratum vigorous variety with lavender flowers for larger pots or garden plantings. ‘Parc‘ Majorelle’ ARARGYGYRANNTHEMUMTHEMUM Argyranthemum ‘Bubblegum Blast’ - No. 1081 ArgyranthemumAth ‘M‘Margarita it 2022’ - No.N 9641 Well branched early season collection of Argyranthemum. Heavy first flush of color created good season on land- scape interest. ArgyranthemumArgyranthemum ‘Citrus’Citrus - NoNo.. 88748874 Argyranthemum ‘Lolly’Lolly - No. 1084 Argyranthemum ‘Raspberry Ruffles’ - No. 1080 AArgyranthemumth ‘Vanilla‘V ill Latte’L tt ’ - No.N 88788766 Argyranthemum ‘White Mocha’ - No. 6183 NORTH AMERICA 2022 KIENTZLER | 5 BEGONIA BELLECONIA™ BEGONIA SUMMERWINGS™ DOUBLE BEGBEGONIAGOONIA BELBELLLECONIAL A™ This high-per-er- formance, robustobust series of double-uble- flowered, pendulousndulous bebegoniagonia varieties thatt are ideal for basketsbaskets and windoww boxes was bred in-house, and its grower performance under greenhouse conditions is unmatched. The cascading plants are literally covered with flowers all season long – BELLECONIA™ characteristics that the home gardener really appreciates. Begonia BELLECONIA™ ‘Hot Orange’ No. 1296: a flowering wonder, producing a deluge of large, bright orange-red pompon flowers. Begonia BELLECONIA™ ‘Citrus’ Begonia BELLECONIA™ ‘Mango’ Begonia BELLECONIA™ ‘Rose’ No. 6727: attractive variety with large No. 6728: wonderful double flowers with a No. 1256: rich, deep rose-pink peony flowers in butter yellow over green foliage. gold to orange colouration, red flower stems. flowers over moss-green foliage. Begonia BELLECONIA™ ‘Salmon’ Begonia BELLECONIA™ ‘Snow’ Beg. BELLECONIA™ ‘Soft Orange’ No. 1281: dark salmon-pink No. 1297: vigorous basket variety with very No. 1258: interesting flower colour, flowers over rich green foliage, large, snow-white flowers. Somewhat later to opening light pink and later flushed early-flowering. flower than the other varieties, but puts on a with orange. spectacularspe ta u a sshow o all a summer su e lolongg iinn ththee sshade!hade! BEGBEGONIAGOONIA SSUMMERWINGUMMERWINGS™ DOUBLBLE Begonia SUMMERWINGS™ ‘Double Cream’ BegoniaBeg SUMMERWINGS™ ‘Double Light Pink’ Begonia SUMMERWINGS™ ‘Double Red’ - No. 5496: No. 9872: double flowering variety with maroon- No. 5495495: special variety with bronze coloured foliage partner variety to ‘Dark Elegance’ with coral-red, coloured foliage and well-branched habit. and light-pink flowers. Good sun tolerance. double flowers over dark foliage. Great sun tolerance. 6 | KIENTZLER 2022 NORTH AMERICA BEGONIA SUMMERWINGS™ BEGONIA SUMMERWINGS™ ELEGANCE COMPACT VARIETIES BBEGONIAEGONIA SSUMMERWINGUMMERWINGS™ Begonia SUMMERWINGS™ ‘Apricot Improved’ No. 1248: earlier to flower, this more floriferous Begonia SUMMERWINGS™ ‘Compact Tangerine’ BegoniaBiSUMM SUMMERWINGSERWRRWINGS™ ‘Compact‘C t OOrange’ ’ selection has a more upright habit. The larger and more No. 5498: large flowers in bright orange colour. No. 5499: a compact type of SUMMERWINGS™ ‘Orange’ intensely coloured flowers are less pendulous and Especially nice in hanging baskets. with well branched habit. present themselves well. Begonia SUMMERWINGS™ ‘Ebony & Orange’ Begonia SUMMERWINGS™ ‘Deep Red’ Begonia SUMMERWINGS™ ‘Rose’ No. 1195: an attractive addition to the range No. 1204: excellent sun tolerance, with deep No. 1206: rich rose-pink, pendulous flowers over of stronger-growing basket types, with initially velvet-red flowers and fern-green foliage.
Recommended publications
  • International Union for the Protection of New Varieties of Plants Geneva
    E TG/COSMO(proj.1) ORIGINAL: English DATE: 2009-07-31 INTERNATIONAL UNION FOR THE PROTECTION OF NEW VARIETIES OF PLANTS GENEVA DRAFT * COSMOS; CHOCOLATE COSMOS; YELLOW COSMOS UPOV Code: COSMO_BIP; COSMO_ATR; COSMO_SUL Cosmos bipinnatus Cav.; Cosmos atrosanguineus (Hook.) Voss; Cosmos sulphureus Cav. GUIDELINES FOR THE CONDUCT OF TESTS FOR DISTINCTNESS, UNIFORMITY AND STABILITY prepared by an expert from Japan to be considered by the Technical Working Party for Ornamental Plants and Forest Trees at its forty-second session, to be held in Angers, France, from September 14 to 18, 2009 Alternative Names:* Botanical name English French German Spanish Cosmos bipinnatus Cav., Cosmos, Cosmos Schmuckkörbchen Mirasol, Cosmos atrosanguineus Chocolate cosmos (Kosmee), Cosmos (Hook.) Voss, Fiederblättrige Cosmos sulphureus Cav. Schmuckblume The purpose of these guidelines (“Test Guidelines”) is to elaborate the principles contained in the General Introduction (document TG/1/3), and its associated TGP documents, into detailed practical guidance for the harmonized examination of distinctness, uniformity and stability (DUS) and, in particular, to identify appropriate characteristics for the examination of DUS and production of harmonized variety descriptions. ASSOCIATED DOCUMENTS These Test Guidelines should be read in conjunction with the General Introduction and its associated TGP documents. * These names were correct at the time of the introduction of these Test Guidelines but may be revised or updated. [Readers are advised to consult the UPOV Code, which can be found on the UPOV Website (www.upov.int), for the latest information.] TG/COSMO(proj.1) Cosmos, 2009-07-31 - 2 - TABLE OF CONTENTS PAGE 1. SUBJECT OF THESE TEST GUIDELINE....................................................................................................3 2.
    [Show full text]
  • Grade 6 Reading Student At–Home Activity Packet
    Printer Warning: This packet is lengthy. Determine whether you want to print both sections, or only print Section 1 or 2. Grade 6 Reading Student At–Home Activity Packet This At–Home Activity packet includes two parts, Section 1 and Section 2, each with approximately 10 lessons in it. We recommend that your student complete one lesson each day. Most lessons can be completed independently. However, there are some lessons that would benefit from the support of an adult. If there is not an adult available to help, don’t worry! Just skip those lessons. Encourage your student to just do the best they can with this content—the most important thing is that they continue to work on their reading! Flip to see the Grade 6 Reading activities included in this packet! © 2020 Curriculum Associates, LLC. All rights reserved. Section 1 Table of Contents Grade 6 Reading Activities in Section 1 Lesson Resource Instructions Answer Key Page 1 Grade 6 Ready • Read the Guided Practice: Answers will vary. 10–11 Language Handbook, Introduction. Sample answers: Lesson 9 • Complete the 1. Wouldn’t it be fun to learn about Varying Sentence Guided Practice. insect colonies? Patterns • Complete the 2. When I looked at the museum map, Independent I noticed a new insect exhibit. Lesson 9 Varying Sentence Patterns Introduction Good writers use a variety of sentence types. They mix short and long sentences, and they find different ways to start sentences. Here are ways to improve your writing: Practice. Use different sentence types: statements, questions, imperatives, and exclamations. Use different sentence structures: simple, compound, complex, and compound-complex.
    [Show full text]
  • Vector Boolean Functions: Applications in Symmetric Cryptography
    Vector Boolean Functions: Applications in Symmetric Cryptography José Antonio Álvarez Cubero Departamento de Matemática Aplicada a las Tecnologías de la Información y las Comunicaciones Universidad Politécnica de Madrid This dissertation is submitted for the degree of Doctor Ingeniero de Telecomunicación Escuela Técnica Superior de Ingenieros de Telecomunicación November 2015 I would like to thank my wife, Isabel, for her love, kindness and support she has shown during the past years it has taken me to finalize this thesis. Furthermore I would also liketo thank my parents for their endless love and support. Last but not least, I would like to thank my loved ones such as my daughter and sisters who have supported me throughout entire process, both by keeping me harmonious and helping me putting pieces together. I will be grateful forever for your love. Declaration The following papers have been published or accepted for publication, and contain material based on the content of this thesis. 1. [7] Álvarez-Cubero, J. A. and Zufiria, P. J. (expected 2016). Algorithm xxx: VBF: A library of C++ classes for vector Boolean functions in cryptography. ACM Transactions on Mathematical Software. (In Press: http://toms.acm.org/Upcoming.html) 2. [6] Álvarez-Cubero, J. A. and Zufiria, P. J. (2012). Cryptographic Criteria on Vector Boolean Functions, chapter 3, pages 51–70. Cryptography and Security in Computing, Jaydip Sen (Ed.), http://www.intechopen.com/books/cryptography-and-security-in-computing/ cryptographic-criteria-on-vector-boolean-functions. (Published) 3. [5] Álvarez-Cubero, J. A. and Zufiria, P. J. (2010). A C++ class for analysing vector Boolean functions from a cryptographic perspective.
    [Show full text]
  • Seed Maturity in White Fir and Red Fir. Pacific Southwest Forest and Range Exp
    PACIFIC SOUTHWEST Forest and Range FOREST SERVICE U. S. DEPARTMENT OF AGRICULTURE P.O. BOX 245, BERKELEY, CALIFORNIA 94701 Experiment Station USDA FOREST SERVICE RESEARCH PAPER PSW-99 /1974 CONTENTS Page Summary ................................................... 1 Introduction ................................................. 3 Methods .................................................... 3 Testing Fresh Seeds ....................................... 3 Testing Stratified Seeds .................................... 3 Seedling Vigor Tests ...................................... 4 Artificial Ripening Trial ................................... 4 Other Observations ........................................ 4 Results and Discussion ....................................... 5 Cone Specific Gravity ..................................... 5 Seed Germination, byCollection Date ....................... 5 Seed GerminationandCone Specific Gravity ................ 7 Red Fir Seedling Vigor .................................... 9 ArtificialRipening of White Fir Seeds ....................... 9 OtherMaturity Indices ..................................... 9 Application ................................................. 10 Literature Cited.............................................. 12 THE AUTHOR WILLIAM W. OLIVER is doing silvicultural research on Sierra Nevada conifer types with headquarters at Redding, California. He earned a B.S. degree (1956) in forestry from the University of New Hampshire, and an M.F. degree (1960) from the University of Michigan. A native of
    [Show full text]
  • Internet Engineering Task Force (IETF) S. Kanno Request for Comments: 6367 NTT Software Corporation Category: Informational M
    Internet Engineering Task Force (IETF) S. Kanno Request for Comments: 6367 NTT Software Corporation Category: Informational M. Kanda ISSN: 2070-1721 NTT September 2011 Addition of the Camellia Cipher Suites to Transport Layer Security (TLS) Abstract This document specifies forty-two cipher suites for the Transport Security Layer (TLS) protocol to support the Camellia encryption algorithm as a block cipher. Status of This Memo This document is not an Internet Standards Track specification; it is published for informational purposes. This document is a product of the Internet Engineering Task Force (IETF). It represents the consensus of the IETF community. It has received public review and has been approved for publication by the Internet Engineering Steering Group (IESG). Not all documents approved by the IESG are a candidate for any level of Internet Standard; see Section 2 of RFC 5741. Information about the current status of this document, any errata, and how to provide feedback on it may be obtained at http://www.rfc-editor.org/info/rfc6367. Copyright Notice Copyright (c) 2011 IETF Trust and the persons identified as the document authors. All rights reserved. This document is subject to BCP 78 and the IETF Trust's Legal Provisions Relating to IETF Documents (http://trustee.ietf.org/license-info) in effect on the date of publication of this document. Please review these documents carefully, as they describe your rights and restrictions with respect to this document. Code Components extracted from this document must include Simplified BSD License text as described in Section 4.e of the Trust Legal Provisions and are provided without warranty as described in the Simplified BSD License.
    [Show full text]
  • Report on the AES Candidates
    Rep ort on the AES Candidates 1 2 1 3 Olivier Baudron , Henri Gilb ert , Louis Granb oulan , Helena Handschuh , 4 1 5 1 Antoine Joux , Phong Nguyen ,Fabrice Noilhan ,David Pointcheval , 1 1 1 1 Thomas Pornin , Guillaume Poupard , Jacques Stern , and Serge Vaudenay 1 Ecole Normale Sup erieure { CNRS 2 France Telecom 3 Gemplus { ENST 4 SCSSI 5 Universit e d'Orsay { LRI Contact e-mail: [email protected] Abstract This do cument rep orts the activities of the AES working group organized at the Ecole Normale Sup erieure. Several candidates are evaluated. In particular we outline some weaknesses in the designs of some candidates. We mainly discuss selection criteria b etween the can- didates, and make case-by-case comments. We nally recommend the selection of Mars, RC6, Serp ent, ... and DFC. As the rep ort is b eing nalized, we also added some new preliminary cryptanalysis on RC6 and Crypton in the App endix which are not considered in the main b o dy of the rep ort. Designing the encryption standard of the rst twentyyears of the twenty rst century is a challenging task: we need to predict p ossible future technologies, and wehavetotake unknown future attacks in account. Following the AES pro cess initiated by NIST, we organized an op en working group at the Ecole Normale Sup erieure. This group met two hours a week to review the AES candidates. The present do cument rep orts its results. Another task of this group was to up date the DFC candidate submitted by CNRS [16, 17] and to answer questions which had b een omitted in previous 1 rep orts on DFC.
    [Show full text]
  • Development of the Advanced Encryption Standard
    Volume 126, Article No. 126024 (2021) https://doi.org/10.6028/jres.126.024 Journal of Research of the National Institute of Standards and Technology Development of the Advanced Encryption Standard Miles E. Smid Formerly: Computer Security Division, National Institute of Standards and Technology, Gaithersburg, MD 20899, USA [email protected] Strong cryptographic algorithms are essential for the protection of stored and transmitted data throughout the world. This publication discusses the development of Federal Information Processing Standards Publication (FIPS) 197, which specifies a cryptographic algorithm known as the Advanced Encryption Standard (AES). The AES was the result of a cooperative multiyear effort involving the U.S. government, industry, and the academic community. Several difficult problems that had to be resolved during the standard’s development are discussed, and the eventual solutions are presented. The author writes from his viewpoint as former leader of the Security Technology Group and later as acting director of the Computer Security Division at the National Institute of Standards and Technology, where he was responsible for the AES development. Key words: Advanced Encryption Standard (AES); consensus process; cryptography; Data Encryption Standard (DES); security requirements, SKIPJACK. Accepted: June 18, 2021 Published: August 16, 2021; Current Version: August 23, 2021 This article was sponsored by James Foti, Computer Security Division, Information Technology Laboratory, National Institute of Standards and Technology (NIST). The views expressed represent those of the author and not necessarily those of NIST. https://doi.org/10.6028/jres.126.024 1. Introduction In the late 1990s, the National Institute of Standards and Technology (NIST) was about to decide if it was going to specify a new cryptographic algorithm standard for the protection of U.S.
    [Show full text]
  • Symmetric Encryption: AES
    Symmetric Encryption: AES Yan Huang Credits: David Evans (UVA) Advanced Encryption Standard ▪ 1997: NIST initiates program to choose Advanced Encryption Standard to replace DES ▪ Why not just use 3DES? 2 AES Process ▪ Open Design • DES: design criteria for S-boxes kept secret ▪ Many good choices • DES: only one acceptable algorithm ▪ Public cryptanalysis efforts before choice • Heavy involvements of academic community, leading public cryptographers ▪ Conservative (but “quick”): 4 year process 3 AES Requirements ▪ Secure for next 50-100 years ▪ Royalty free ▪ Performance: faster than 3DES ▪ Support 128, 192 and 256 bit keys • Brute force search of 2128 keys at 1 Trillion keys/ second would take 1019 years (109 * age of universe) 4 AES Round 1 ▪ 15 submissions accepted ▪ Weak ciphers quickly eliminated • Magenta broken at conference! ▪ 5 finalists selected: • MARS (IBM) • RC6 (Rivest, et. al.) • Rijndael (Belgian cryptographers) • Serpent (Anderson, Biham, Knudsen) • Twofish (Schneier, et. al.) 5 AES Evaluation Criteria 1. Security Most important, but hardest to measure Resistance to cryptanalysis, randomness of output 2. Cost and Implementation Characteristics Licensing, Computational, Memory Flexibility (different key/block sizes), hardware implementation 6 AES Criteria Tradeoffs ▪ Security v. Performance • How do you measure security? ▪ Simplicity v. Complexity • Need complexity for confusion • Need simplicity to be able to analyze and implement efficiently 7 Breaking a Cipher ▪ Intuitive Impression • Attacker can decrypt secret messages • Reasonable amount of work, actual amount of ciphertext ▪ “Academic” Ideology • Attacker can determine something about the message • Given unlimited number of chosen plaintext-ciphertext pairs • Can perform a very large number of computations, up to, but not including, 2n, where n is the key size in bits (i.e.
    [Show full text]
  • Nessie Neutrally-Buoyant Elevated System for Satellite Imaging and Evaluation
    NESSIE NEUTRALLY-BUOYANT ELEVATED SYSTEM FOR SATELLITE IMAGING AND EVALUATION 1 Project Overview Space Situational Awareness (SSA) • Determine the orbital characteristics of objects in space Currently there are only two methods Radar • Expensive Telescopes • Cheaper, but can be blocked by cloud cover Both are fully booked and can't collect enough data Over 130,000,000 estimated objects in orbit 2 Introduction Solution Critical Project Elements Risk Analysis Schedule Our Mission: MANTA NESSIE • Full-Scale SSA UAV • Proof of concept vehicle • Operates at 18000ft • Operates at 400ft AGL • Fully realized optical Scale • Payload bay capability 1 : 2.5 payload • Mass 1 lb • Mass 15 lbs • Contained in 4.9” cube • Contained in 12” cube • Requires 5.6 W of Power • Requires 132 W of Power • Provide path to flight at full-scale 3 Introduction Solution Critical Project Elements Risk Analysis Schedule Stay on a 65,600 ft to 164,000 ft distance from takeoff spot Legend: 10 arcseconds object Requirements centroid identification 5. Point optical Dimness ≥ 13 accuracy, 3 sigma precision system, capture Operations flow apparent magnitude image, measure time and position 4. Pointing and stabilization check, 6. Store image autonomous flight and data 7. Start autonomous Loop descent to Ground Station when battery is low. Constantly downlink 3. Manual ascent position and status above clouds, uplink data to ground station 8. Manual landing, Max 18,000 altitude ft from ground station uplink from ground station 1. System 2. Unload/ Assembly/ Prep. Ground Station End of mission 14 transportation hours after first ascent 4 Land 300 ft (100 yards) from takeoff spot Stay within 400 ft of takeoff spot Legend: 4.
    [Show full text]
  • Critical Assessment of Reaction Mechanisms Using the Lisbon Kinetics Tool Suit
    XXXIV ICPIG & ICRP-10, July 14-19, 2019, Sapporo, Hokkaido, Japan Critical assessment of reaction mechanisms using the LisbOn KInetics tool suit 1 1 1 2 P P P P P A. Tejero-del-Caz P , V.U Guerra UP , M. Lino da Silva P , L. Marques P , 1 1,3 1 1 P P P N. Pinhão P , C. D. Pintassilgo P , T. Silva P and L. L. Alves P 1 P P Instituto de Plasmas e Fusão Nuclear, Instituto Superior Técnico, Universidade de Lisboa, Av. Rovisco Pais, Lisboa, Portugal 2 P P Centro de Física da Universidade do Minho, Campus de Gualtar, Braga, Portugal 3 P P Faculdade de Engenharia da Universidade do Porto, Porto, Portugal This work uses the LisbOn KInetics (LoKI) tool suit to perform a critical assessment and correction of the collisional, radiative and transport mechanisms and data describing the kinetics of several gas/plasma systems. LoKI comprises two modules: a Boltzmann solver, LoKI-B (to become open- source), and a chemistry solver, LoKI-C. Both modules can run as standalone tools or coupled in a self-consistent manner. LoKI handles simulations in any atomic / molecular gas mixture, considering collisions with any target state (electronic, vibrational and rotational), specified in the reaction mechanism adopted. As output, the tool provides the electron energy distribution function and the corresponding electron macroscopic parameters, along with the densities of species and the corresponding creation / destruction rates. 1. Introduction for the heavy species (charged and neutral) present in Predictive tools for non-equilibrium low- the plasma, receiving as input data the KIT(s) for the temperature plasmas (LTPs) should properly describe gas/plasma system under study, and using several the kinetics of both the electrons and the heavy- modules to describe the mechanisms (collisional, species, the former responsible for inducing plasma radiative and transport) controlling the creation / reactivity and the latter providing the pathways for destruction of species.
    [Show full text]
  • Study on the Use of Cryptographic Techniques in Europe
    Study on the use of cryptographic techniques in Europe [Deliverable – 2011-12-19] Updated on 2012-04-20 II Study on the use of cryptographic techniques in Europe Contributors to this report Authors: Edward Hamilton and Mischa Kriens of Analysys Mason Ltd Rodica Tirtea of ENISA Supervisor of the project: Rodica Tirtea of ENISA ENISA staff involved in the project: Demosthenes Ikonomou, Stefan Schiffner Agreements or Acknowledgements ENISA would like to thank the contributors and reviewers of this study. Study on the use of cryptographic techniques in Europe III About ENISA The European Network and Information Security Agency (ENISA) is a centre of network and information security expertise for the EU, its member states, the private sector and Europe’s citizens. ENISA works with these groups to develop advice and recommendations on good practice in information security. It assists EU member states in implementing relevant EU leg- islation and works to improve the resilience of Europe’s critical information infrastructure and networks. ENISA seeks to enhance existing expertise in EU member states by supporting the development of cross-border communities committed to improving network and information security throughout the EU. More information about ENISA and its work can be found at www.enisa.europa.eu. Contact details For contacting ENISA or for general enquiries on cryptography, please use the following de- tails: E-mail: [email protected] Internet: http://www.enisa.europa.eu Legal notice Notice must be taken that this publication represents the views and interpretations of the au- thors and editors, unless stated otherwise. This publication should not be construed to be a legal action of ENISA or the ENISA bodies unless adopted pursuant to the ENISA Regulation (EC) No 460/2004 as lastly amended by Regulation (EU) No 580/2011.
    [Show full text]
  • Bruce Schneier 2
    Committee on Energy and Commerce U.S. House of Representatives Witness Disclosure Requirement - "Truth in Testimony" Required by House Rule XI, Clause 2(g)(5) 1. Your Name: Bruce Schneier 2. Your Title: none 3. The Entity(ies) You are Representing: none 4. Are you testifying on behalf of the Federal, or a State or local Yes No government entity? X 5. Please list any Federal grants or contracts, or contracts or payments originating with a foreign government, that you or the entity(ies) you represent have received on or after January 1, 2015. Only grants, contracts, or payments related to the subject matter of the hearing must be listed. 6. Please attach your curriculum vitae to your completed disclosure form. Signatur Date: 31 October 2017 Bruce Schneier Background Bruce Schneier is an internationally renowned security technologist, called a security guru by the Economist. He is the author of 14 books—including the New York Times best-seller Data and Goliath: The Hidden Battles to Collect Your Data and Control Your World—as well as hundreds of articles, essays, and academic papers. His influential newsletter Crypto-Gram and blog Schneier on Security are read by over 250,000 people. Schneier is a fellow at the Berkman Klein Center for Internet and Society at Harvard University, a Lecturer in Public Policy at the Harvard Kennedy School, a board member of the Electronic Frontier Foundation and the Tor Project, and an advisory board member of EPIC and VerifiedVoting.org. He is also a special advisor to IBM Security and the Chief Technology Officer of IBM Resilient.
    [Show full text]