World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Nist Special Publication 800-17

By Keller, Sharon S.

Click here to view

Book Id: WPLBN0000694980
Format Type: PDF eBook
File Size: 405.57 KB.
Reproduction Date: 2005
Full Text

Title: Nist Special Publication 800-17  
Author: Keller, Sharon S.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Keller, S. S. (n.d.). Nist Special Publication 800-17. Retrieved from http://www.worldebookfair.com/


Description
Technical Reference Publication

Excerpt
Abstract: The National Institute of Standards and Technology (NIST) Modes of Operation Validation System (MOVS) specifies the procedures involved in validating implementations of the DES algorithm in FIPS PUB 46-2 The Data Encryption Standard (DES) and the Skipjack algorithm in FIPS PUB 185, Escrowed Encryption Standard (ESS). The MOVS is designed to perform automated testing on Implementations Under Test (IUTs). This publication provides brief overviews of the DES and Skipjack algorithms and introduces the basic design and configuration of the MOVS. Included in this overview are the specifications for the two categories of tests which make up the MOVS, i.e., the Known Answer tests and the Modes tests. The requirements and administrative procedures to be followed by those seeking formal NIST validation of an implementation of the DES or Skipjack algorithm are presented. The requirements described include the specific protocols for communication between the IUT and the MOVS, the types of tests which the IUT?

Table of Contents
TABLE OF CONTENTS ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1. INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.1 Background . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 1.2 Organization . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 2 2. PRIVATE KEY ALGORITHMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1 Data Encryption Standard (DES) (FIPS PUB 46-2) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 3 2.1.1 The S-boxes . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.2 The Key Schedule . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 2.1.3 The Permutations and E Operator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.2 Skipjack Encryption Algorithm . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5 2.3 The Four Modes of Operation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 2.3.1 Electronic Codebook (ECB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 2.3.2 Cipher Block Chaining (CBC) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 2.3.3 Cipher Feedback (CFB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 10 2.3.4 Output Feedback (OFB) Mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12 3. MODES OF OPERATION VALIDATION SYSTEM FOR THE DES AND SKIPJACK ALGORITHMS . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.1 The Known Answer Tests . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14 3.1.1 The Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 15 3.1.1.1 The Variable Plaintext Known Answer Test . . . . . . . . . . . . . . . . . . . . 15 3.1.1.2 The Inverse Permutation Known Answer Test for the Encrypt State . . 15 3.1.1.3 The Variable Key Known Answer Test for the Encryption Process . . . 16 3.1.1.4 The Permutation Operation Known Answer Test for the Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.1.1.5 The Substitution Table Known Answer Test for the Encryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17 3.1.2 The Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.1.2.1 The Variable Ciphertext Known Answer Test . . . . . . . . . . . . . . . . . . . 18 3.1.2.2 The Initial Permutation Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18 3.1.2.3 The Variable Key Known Answer Test for the Decryption Process . . . 19 3.1.2.4 The Permutation Operation Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19 3.1.2.5 The Substitution Table Known Answer Test for the Decryption Process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 3.2 The Modes Test . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 4. BASIC PROTOCOL . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1 Overview . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.1 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.1.2 Message Data Types . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 4.2 Message Contents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23

 

Click To View

Additional Books


  • Evaluated Kinetic and Photochemical Data... (by )
  • Toward Next-Generation Construction Mach... (by )
  • Reporting 
  • Secure Cyberspace 
  • Thermodynamic Properties of Dioxygen Dif... (by )
  • Thermodynamic Functions and Properties o... (by )
  • Cross Sections and Related Data for Elec... (by )
  • Cross Sections and Swarm Coefficients fo... (by )
  • Administrative Modifications 
  • Indefinite Delivery Indefinite Quantity ... 
  • Credit Card Purchases 
  • Awards 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Fair are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.