Skipjack (cipher): Difference between revisions
Jump to navigation
Jump to search
imported>Peter Schmitt (subpages template) |
John Leach (talk | contribs) m (Text replacement - "{{subpages}}" to "{{PropDel}}<br><br>{{subpages}}") |
||
(2 intermediate revisions by one other user not shown) | |||
Line 1: | Line 1: | ||
{{subpages}} | {{PropDel}}<br><br>{{subpages}} | ||
'''Skipjack''' was a [[block cipher]] devised by the [[NSA]], originally intended for use in the controversial [[Clipper chip]]. It was to be used only in tamperproof hardware, and the algorithm was originally classified. This added to the controversy, with many people citing [[Kerckhoffs' Principle]] and arguing that a cipher whose details were classified could not be trusted. Some felt that nothing from the NSA should be trusted in any case. | '''Skipjack''' was a [[block cipher]] devised by the [[NSA]], originally intended for use in the controversial [[Clipper chip]]. It was to be used only in tamperproof hardware, and the algorithm was originally classified. This added to the controversy, with many people citing [[Kerckhoffs' Principle]] and arguing that a cipher whose details were classified could not be trusted. Some felt that nothing from the NSA should be trusted in any case. |
Latest revision as of 05:48, 8 April 2024
This article may be deleted soon. | ||
---|---|---|
Skipjack was a block cipher devised by the NSA, originally intended for use in the controversial Clipper chip. It was to be used only in tamperproof hardware, and the algorithm was originally classified. This added to the controversy, with many people citing Kerckhoffs' Principle and arguing that a cipher whose details were classified could not be trusted. Some felt that nothing from the NSA should be trusted in any case. Eventually, the algorithm was de-classified. Skipjack is an unbalanced Feistel cipher with 64-bit blocks, an 80-bit key and 32 rounds. Once the algorithm was public, the first paper describing an attack on a reduced-round version [1] appeared in days and other papers on cryptanalysis of Skipjack [2] [3] followed. References
|