Cryptography Reference
In-Depth Information
2. Set the new
w
2
value to be the
G
permutation of the old
w
1
.
3. Set the new
w
3
to be the old
w
2
.
4. Set the new
w
4
to be the old
w
3
.
5. Increment the counter.
Figure 4-17
shows this process.
Figure 4-17
Skipjack Rule A.
Skipjack Rule B
Rule B works similarly to Rule A.
1. Set the new
w
1
value to be the old
w
4
value.
2. Set the new
w
2
value to be the
G
permutation of the old
w
1
.
3. Set the new
w
3
to be the old
w
1
XORed with the counter and XORed with the old
w
2
value.
4. Set the new
w
4
to be the old
w
3
.
5. Increment the counter.
Figure 4-18
shows Rule B.
Figure 4-18
Skipjack Rule B.
4.11.2 Skipjack Decryption Algorithm
Decryption of a Skipjack ciphertext is fairly straightforward: Every operation from above is reversible, includ-
ing the
G
permutation. The rules are replaced with two new rules: A
-1
and B
-1
. The decryption is performed by
running Rule B
-1
eight times, followed by Rule A
-1
eight times, Rule B
-1
eight times again, and finally Rule
A
-1
eight times.
Please note that the counter needs to run backwards. The keys are also submitted in reverse order
k
= 31, 30,
... , 0. That is, we start knowing the values for
k
= 32 (this corresponds to the ciphertext) and calculate the values
for
k
= 0 (this corresponds to the plaintext).
Skipjack Rule A
-1
Rule A
-1
follows a similar structure to Rule A of the encryption.
Search WWH ::
Custom Search