Add to Book Shelf
Flag as Inappropriate
Email this Book

Information Technology Laboratory0

By Keller, Sharon S.

Click here to view

Book Id: WPLBN0000694979
Format Type: PDF eBook:
File Size: 0.4 MB
Reproduction Date: 2005

Title: Information Technology Laboratory0  
Author: Keller, Sharon S.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

S. Kelle, B. S. (n.d.). Information Technology Laboratory0. Retrieved from http://gutenberg.cc/


Description
Technical Reference Publication

Excerpt
Introduction: This publication specifies the various tests required to validate implementations under test (IUTs) for conformance to the DES and Skipjack algorithms. When applied to IUTs of the DES algorithm, the Modes of Operation Validation System (MOVS) provides conformance testing for the various components of the algorithm, as well as testing for apparent operational errors. The MOVS is also used to test for apparent operational errors in IUTs of the Skipjack algorithm.

Table of Contents
TABLE OF CONTENTS ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. PRIVATE KEY ALGORITHMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1 Data Encryption Standard (DES) (FIPS PUB 46-2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1.1 The S-boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.2 The Key Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 The Permutations and E Operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Skipjack Encryption Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 The Four Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3.1 Electronic Codebook (ECB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.3.2 Cipher Block Chaining (CBC) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3.3 Cipher Feedback (CFB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3.4 Output Feedback (OFB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3. MODES OF OPERATION VALIDATION SYSTEM FOR THE DES AND SKIPJACK ALGORITHMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.1 The Known Answer Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.1.1 The Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.1.1.1 The Variable Plaintext Known Answer Test . . . . . . . . . . . . . . . . . . . . 15 3.1.1.2 The Inverse Permutation Known Answer Test for the Encrypt State . . 15 3.1.1.3 The Variable Key Known Answer Test for the Encryption Process . . . 16 3.1.1.4 The Permutation Operation Known Answer Test for the Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.1.1.5 The Substitution Table Known Answer Test for the Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.1.2 The Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.1.2.1 The Variable Ciphertext Known Answer Test . . . . . . . . . . . . . . . . . . . 18 3.1.2.2 The Initial Permutation Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.1.2.3 The Variable Key Known Answer Test for the Decryption Process . . . 19 3.1.2.4 The Permutation Operation Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.2.5 The Substitution Table Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2 The Modes Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 4. BASIC PROTOCOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.1 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.2 Message Data Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.2 Message Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.