[2873] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Attacks on Skipjack?

daemon@ATHENA.MIT.EDU (Marcus Leech)
Thu Jun 25 23:12:23 1998

Date: Thu, 25 Jun 1998 16:01:38 -0400
From: "Marcus Leech" <Marcus.Leech.mleech@nt.com>
To: cryptography@c2.net

Intellectual exercise:

An attack on the last round of Skipjack requires a guess at the subkey, and
  a guess at input to the final XOR that produces G6.  We know the values for
  G5 and G6, we need to guess at CV(4K+3), and the input value that XORs
  with the output of F to produce G6.  These are both byte values, so a given
  random guess has a probability of being correct of approximately 1/65536.
  A successful attack produces the correct value used in CV(4K+3) mod 10, which
  may allow cracking open of other rounds.  The attack would require some known
  ciphertext, enough to determine that you've made a correct guess at the keying
  material, and the input to the final XOR in G().

In reality, this probably doesn't work very well, since unreasonable amounts of
  ciphertext might be required to converge on the correct guess, and it only yields
  you 1/10th of the key space.


-- 
----------------------------------------------------------------------
Marcus Leech                             Mail:   Dept 8M70, MS 012, FITZ
Systems Security Architect               Phone: (ESN) 393-9145  +1 613 763 9145
Security and Internet Solutions          Fax:   (ESN) 395-1407  +1 613 765 1407
Nortel Technology              mleech@nortel.ca
-----------------Expressed opinions are my own, not my employer's------

home help back first fref pref prev next nref lref last post