Add to Book Shelf
Flag as Inappropriate
Email this Book

Nist Special Publication 800-17

By Keller, Sharon S.

Click here to view

Book Id: WPLBN0000694980
Format Type: PDF eBook:
File Size: 0.4 MB
Reproduction Date: 2005

Title: Nist Special Publication 800-17  
Author: Keller, Sharon S.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

S. Kelle, B. S. (n.d.). Nist Special Publication 800-17. Retrieved from http://gutenberg.cc/


Description
Technical Reference Publication

Excerpt
Abstract: The National Institute of Standards and Technology (NIST) Modes of Operation Validation System (MOVS) specifies the procedures involved in validating implementations of the DES algorithm in FIPS PUB 46-2 The Data Encryption Standard (DES) and the Skipjack algorithm in FIPS PUB 185, Escrowed Encryption Standard (ESS). The MOVS is designed to perform automated testing on Implementations Under Test (IUTs). This publication provides brief overviews of the DES and Skipjack algorithms and introduces the basic design and configuration of the MOVS. Included in this overview are the specifications for the two categories of tests which make up the MOVS, i.e., the Known Answer tests and the Modes tests. The requirements and administrative procedures to be followed by those seeking formal NIST validation of an implementation of the DES or Skipjack algorithm are presented. The requirements described include the specific protocols for communication between the IUT and the MOVS, the types of tests which the IUT?

Table of Contents
TABLE OF CONTENTS ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. PRIVATE KEY ALGORITHMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1 Data Encryption Standard (DES) (FIPS PUB 46-2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1.1 The S-boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.2 The Key Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 The Permutations and E Operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Skipjack Encryption Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 The Four Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3.1 Electronic Codebook (ECB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.3.2 Cipher Block Chaining (CBC) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3.3 Cipher Feedback (CFB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3.4 Output Feedback (OFB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3. MODES OF OPERATION VALIDATION SYSTEM FOR THE DES AND SKIPJACK ALGORITHMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.1 The Known Answer Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.1.1 The Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.1.1.1 The Variable Plaintext Known Answer Test . . . . . . . . . . . . . . . . . . . . 15 3.1.1.2 The Inverse Permutation Known Answer Test for the Encrypt State . . 15 3.1.1.3 The Variable Key Known Answer Test for the Encryption Process . . . 16 3.1.1.4 The Permutation Operation Known Answer Test for the Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.1.1.5 The Substitution Table Known Answer Test for the Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.1.2 The Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.1.2.1 The Variable Ciphertext Known Answer Test . . . . . . . . . . . . . . . . . . . 18 3.1.2.2 The Initial Permutation Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.1.2.3 The Variable Key Known Answer Test for the Decryption Process . . . 19 3.1.2.4 The Permutation Operation Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.2.5 The Substitution Table Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2 The Modes Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 4. BASIC PROTOCOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.1 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.2 Message Data Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.2 Message Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

 
 



Copyright © World Library Foundation. All rights reserved. eBooks from Project Gutenberg are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.