Abstract
Skipjack is the secret key encryption algorithm developed by the NSA for the Clipper chip and Fortezza PC card. It uses an 80-bit key, 128 table lookup operations, and 320 XOR operations to map a 64-bit plaintext into a 64-bit ciphertext in 32 rounds. This paper describes an efficient attack on a variant, which we call Skipjack- 3XOR (Skipjack minus 3 XORs). The only difference between Skipjack and Skipjack-3XOR is the removal of 3 out of the 320 XOR operations. The attack uses the ciphertexts derived from about 500 plaintexts and its total running time is equivalent to about one million Skipjack encryptions, which can be carried out in seconds on a personal computer. We also present a new cryptographic tool, which we call the Yoyo game, and efficient attacks on Skipjack reduced to 16 rounds. We conclude that Skipjack does not have a conservative design with a large margin of safety.
Chapter PDF
Similar content being viewed by others
References
Eli Biham, On Matsui’s Linear Cryptanalysis, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’94, pp. 341–355, 1994.
Eli Biham, Alex Biryukov, Orr Dunkelman, Eran Richardson, Adi Shamir, Initial Observations on the Skipjack Encryption Algorithm, June 25, 1998, available at http://www.cs.technion.ac.il/~biham/Reports/SkipJack/.
Eli Biham, Adi Shamir, DifferentialCryptanalysis of the Data Encryption Standard, Springer-Verlag, 1993.
Ernest F. Brickell, Dorothy E. Denning, Stephen T. Kent, David P. Maher, Walter Tuchman, SKIPJACK Review, Interim Report, The SKIPJACK Algorithm, July 28, 1993. Available at http://www.austinlinks.com/Crypto/skipjack-review.html.
Lars R. Knudsen, Thomas A. Berson, Truncated differentials of SAFER-K64, proceedings of Fast Software Encryption, Cambridge, Lecture Notes in Computer Science, pp. 15–26, 1996.
Mitsuru Matsui, Linear Cryptanalysis Method for DES Cipher, Lecture Notes in Computer Science, Advances in Cryptology, proceedings of EUROCRYPT’93, pp. 386–397, 1993.
Skipjack and KEA Algorithm Specifications, Version 2.0, 29 May 1998. Available at the National Institute of Standards and Technology’s web page, http://csrc.nist.gov/encryption/skipjack-kea.htm.
David Wagner, Further Attacks on 16 Rounds of SkipJack, private communication, July 1998.
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 1999 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Biham, E., Biryukov, A., Dunkelman, O., Richardson, E., Shamir, A. (1999). Initial Observations on Skipjack: Cryptanalysis of Skipjack-3XOR. In: Tavares, S., Meijer, H. (eds) Selected Areas in Cryptography. SAC 1998. Lecture Notes in Computer Science, vol 1556. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-48892-8_27
Download citation
DOI: https://doi.org/10.1007/3-540-48892-8_27
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-65894-8
Online ISBN: 978-3-540-48892-7
eBook Packages: Springer Book Archive