1998-07-03 - jeopardize law enforcement and national security objectives

Header Data

From: Anonymous <nobody@remailer.ch>
To: cypherpunks@toad.com
Message Hash: 6546a5e8d3c63243e6ef331de5e7b205f1d16afb450ff0835b964f4d3bbf2144
Message ID: <19980703044220.28128.qmail@hades.rpini.com>
Reply To: N/A
UTC Datetime: 1998-07-03 04:22:40 UTC
Raw Date: Thu, 2 Jul 1998 21:22:40 -0700 (PDT)

Raw message

From: Anonymous <nobody@remailer.ch>
Date: Thu, 2 Jul 1998 21:22:40 -0700 (PDT)
To: cypherpunks@toad.com
Subject: jeopardize law enforcement and national security objectives
Message-ID: <19980703044220.28128.qmail@hades.rpini.com>
MIME-Version: 1.0
Content-Type: text/plain



                              SKIPJACK Review
                                      
                               Interim Report
                                      
                           The SKIPJACK Algorithm
                                      
              Ernest F. Brickell, Sandia National Laboratories
                 Dorothy E. Denning, Georgetown University
              Stephen T. Kent, BBN Communications Corporation
                            David P. Maher, AT&T
                    Walter Tuchman, Amperif Corporation
   
                               July 28, 1993
   
                             (Copyright (c) 1993)
     _________________________________________________________________
   
                             Executive Summary
                                      
   The objective of the SKIPJACK review was to provide a mechanism
   whereby persons outside the government could evaluate the strength of
   the classified encryption algorithm used in the escrowed encryption
   devices and publicly report their findings. Because SKIPJACK is but
   one component of a large, complex system, and because the security of
   communications encrypted with SKIPJACK depends on the security of the
   system as a whole, the review was extended to encompass other
   components of the system. The purpose of this Interim Report is to
   report on our evaluation of the SKIPJACK algorithm. A later Final
   Report will address the broader system issues.

[...]

       We examined the internal structure of SKIPJACK to determine its
       susceptibility to differential cryptanalysis. We concluded it was
       not possible to perform an attack based on differential
       cryptanalysis in less time than with exhaustive search.

[...]

       SKIPJACK algorithm is classified SECRET NOT RELEASABLE TO FOREIGN
       NATIONALS. This classification reflects the high quality of the
       algorithm, i.e., it incorporates design techniques that are
       representative of algorithms used to protect classified
       information. Disclosure of the algorithm would permit analysis
       that could result in discovery of these classified design
       techniques, and this would be detrimental to national security.
       However, while full exposure of the internal details of SKIPJACK
       would jeopardize law enforcement and national security objectives,
       it would not jeopardize the security of encrypted communications.
       This is because a shortcut attack is not feasible even with full
       knowledge of the algorithm. Indeed, our analysis of the
       susceptibility of SKIPJACK to a brute force or shortcut attack was
       based on the assumption that the algorithm was known.
       Conclusion 3: While the internal structure of SKIPJACK must be
       classified in order to protect law enforcement and national
       security objectives, the strength of SKIPJACK against a
       cryptanalytic attack does not depend on the secrecy of the
       algorithm.





Thread