In
cryptography
Cryptography, or cryptology (from "hidden, secret"; and ''graphein'', "to write", or ''-logy, -logia'', "study", respectively), is the practice and study of techniques for secure communication in the presence of Adversary (cryptography), ...
, Skipjack is a
block cipher
In cryptography, a block cipher is a deterministic algorithm that operates on fixed-length groups of bits, called ''blocks''. Block ciphers are the elementary building blocks of many cryptographic protocols. They are ubiquitous in the storage a ...
—an
algorithm
In mathematics and computer science, an algorithm () is a finite sequence of Rigour#Mathematics, mathematically rigorous instructions, typically used to solve a class of specific Computational problem, problems or to perform a computation. Algo ...
for encryption—developed by the
U.S.
The United States of America (USA), also known as the United States (U.S.) or America, is a country primarily located in North America. It is a federal republic of 50 states and a federal capital district, Washington, D.C. The 48 contiguous ...
National Security Agency
The National Security Agency (NSA) is an intelligence agency of the United States Department of Defense, under the authority of the director of national intelligence (DNI). The NSA is responsible for global monitoring, collection, and proces ...
(NSA). Initially
classified, it was originally intended for use in the controversial
Clipper chip. Subsequently, the algorithm was declassified.
History of Skipjack
Skipjack was proposed as the encryption algorithm in a US government-sponsored scheme of
key escrow, and the
cipher
In cryptography, a cipher (or cypher) is an algorithm for performing encryption or decryption—a series of well-defined steps that can be followed as a procedure. An alternative, less common term is ''encipherment''. To encipher or encode i ...
was provided for use in the
Clipper chip, implemented in
tamperproof hardware. Skipjack is used only for encryption; the key escrow is achieved through the use of a separate mechanism known as the
Law Enforcement Access Field (LEAF).
The algorithm was initially secret, and was regarded with considerable suspicion by many for that reason. It was
declassified on 24 June 1998, shortly after its basic design principle had been discovered independently by the public cryptography community.
To ensure public confidence in the algorithm, several academic researchers from outside the government were called in to evaluate the algorithm.
The researchers found no problems with either the algorithm itself or the evaluation process. Moreover, their report gave some insight into the (classified) history and development of Skipjack:
In March 2016,
NIST
The National Institute of Standards and Technology (NIST) is an agency of the United States Department of Commerce whose mission is to promote American innovation and industrial competitiveness. NIST's activities are organized into physical s ...
published a draft of its cryptographic standard which no longer certifies Skipjack for US government applications.
Description
Skipjack uses an
80-bit key to encrypt or decrypt
64-bit
In computer architecture, 64-bit integers, memory addresses, or other data units are those that are 64 bits wide. Also, 64-bit central processing units (CPU) and arithmetic logic units (ALU) are those that are based on processor registers, a ...
data blocks. It is an
unbalanced Feistel network with 32 rounds. It was designed to be used in secured phones.
Cryptanalysis
Eli Biham
Eli Biham () is an Israeli cryptographer and cryptanalyst who is a professor at the Technion - Israel Institute of Technology Computer Science department. From 2008 to 2013, Biham was the dean of the Technion Computer Science department, afte ...
and
Adi Shamir
Adi Shamir (; born July 6, 1952) is an Israeli cryptographer and inventor. He is a co-inventor of the Rivest–Shamir–Adleman (RSA) algorithm (along with Ron Rivest and Len Adleman), a co-inventor of the Feige–Fiat–Shamir identification sc ...
discovered an attack against 16 of the 32 rounds within one day of declassification,
and (with
Alex Biryukov) extended this to 31 of the 32 rounds (but with an attack only slightly faster than exhaustive search) within months using
impossible differential cryptanalysis.
[
]
A truncated differential attack was also published against 28 rounds of Skipjack cipher.
A claimed attack against the full cipher was published in 2002, but a later paper with attack designer as a co-author clarified in 2009 that no attack on the full 32 round cipher was then known.
In pop culture
An algorithm named Skipjack forms part of the
back-story
A backstory, background story, background, or legend is a set of events invented for a plot, preceding and leading up to that plot. In acting, it is the history of the character before the drama begins, and is created during the actor's preparat ...
to
Dan Brown
Daniel Gerhard Brown (born June 22, 1964) is an American author best known for his Thriller (genre), thriller novels, including the Robert Langdon (book series), Robert Langdon novels ''Angels & Demons'' (2000), ''The Da Vinci Code'' (2003), '' ...
's 1998 novel ''
Digital Fortress
''Digital Fortress'' is a techno-thriller novel written by American author Dan Brown and published in 1998 by St. Martin's Press. The book explores the theme of government surveillance of electronically stored information on the private lives of ...
''. In Brown's novel, Skipjack is proposed as the new
public-key encryption standard, along with a
back door secretly inserted by the NSA ("a few lines of cunning programming") which would have allowed them to decrypt Skipjack using a secret password and thereby "read the world's email". When details of the cipher are publicly released, programmer Greg Hale discovers and announces details of the backdoor. In real life there is evidence to suggest that the NSA has added back doors to at least one algorithm; the
Dual_EC_DRBG
Dual_EC_DRBG (Dual Elliptic Curve Deterministic Random Bit Generator) is an algorithm that was presented as a cryptographically secure pseudorandom number generator (CSPRNG) using methods in elliptic curve cryptography. Despite wide public criti ...
random number algorithm may contain a backdoor accessible only to the NSA.
Additionally, in the ''
Half-Life 2'' modification ''
Dystopia
A dystopia (lit. "bad place") is an imagined world or society in which people lead wretched, dehumanized, fearful lives. It is an imagined place (possibly state) in which everything is unpleasant or bad, typically a totalitarian or environmen ...
'', the "encryption" program used in cyberspace apparently uses both Skipjack and
Blowfish algorithms.
References
Further reading
*
*
*
External links
SCAN's entry for the cipher
{{DEFAULTSORT:Skipjack (Cipher)
Type 2 encryption algorithms
National Security Agency cryptography