World Library  


Add to Book Shelf
Flag as Inappropriate
Email this Book

Information Technology Laboratory

By Keller, Sharon S.

Click here to view

Book Id: WPLBN0000693558
Format Type: PDF eBook
File Size: 1.22 MB.
Reproduction Date: 2005

Title: Information Technology Laboratory  
Author: Keller, Sharon S.
Volume:
Language: English
Subject: Technology., Reference materials, Technology and literature
Collections: Techonology eBook Collection
Historic
Publication Date:
Publisher:

Citation

APA MLA Chicago

Keller, S. S. (n.d.). Information Technology Laboratory. Retrieved from http://www.ebooklibrary.org/


Description
Technical Reference Publication

Excerpt
Introduction: This publication specifies the various tests required to validate implementations under test (IUTs) for conformance to the DES and Skipjack algorithms. When applied to IUTs of the DES algorithm, the Modes of Operation Validation System (MOVS) provides conformance testing for the various components of the algorithm, as well as testing for apparent operational errors. The MOVS is also used to test for apparent operational errors in IUTs of the Skipjack algorithm.

Table of Contents
TABLE OF CONTENTS 1. INTRODUCTION...................................................................................................................................... 1 1.1 BACKGROUND.......................................................................................................................................... 1 1.2 ORGANIZATION ........................................................................................................................................ 2 1.3 DEFINITION(S).......................................................................................................................................... 3 1.4 SYMBOLS (AND ACRONYMS) ...................................................................................................................... 4 2. TRIPLE DATA ENCRYPTION ALGORITHM (TDEA)......................................................................... 6 2.1 TDEA ELECTRONIC CODEBOOK (TECB) MODE......................................................................................... 7 2.2 TDEA CIPHER BLOCK CHAINING (TCBC) MODE ....................................................................................... 8 2.3 TDEA CIPHER BLOCK CHAINING - INTERLEAVED (TCBC-I) MODE ............................................................ 9 2.4 TDEA CIPHER FEEDBACK (TCFB) MODE................................................................................................ 11 2.5 TDEA CIPHER FEEDBACK MODE OF OPERATION - PIPELINED (TCFB-P).................................................... 12 2.6 TDEA OUTPUT FEEDBACK (TOFB) MODE............................................................................................... 13 2.7 TDEA OUTPUT FEEDBACK MODE OF OPERATION - INTERLEAVED (TOFB-I).............................................. 14 3. MODES OF OPERATION VALIDATION SYSTEM FOR THE TRIPLE DES (TDES) ALGORITHM .................................................................................................................................................................. 15 3.1 THE KNOWN ANSWER TESTS ................................................................................................................... 15 3.1.1 The Encryption Process................................................................................................................. 15 3.1.1.1 The Variable Plaintext Known Answer Test............................................................................................. 16 3.1.1.2 The Inverse Permutation Known Answer Test .......................................................................................... 16 3.1.1.3 The Variable Key Known Answer Test for the Encryption Process ........................................................... 17 3.1.1.4 The Permutation Operation Known Answer Test for the Encryption Process............................................. 18 3.1.1.5 The Substitution Table Known Answer Test for the Encryption Process.................................................... 19 3.1.2 The Decryption Process ................................................................................................................ 20 3.1.2.1 The Variable Ciphertext Known Answer Test .......................................................................................... 20 3.1.2.2 The Initial Permutation Known Answer Test ............................................................................................ 21 3.1.2.3 The Variable Key Known Answer Test for the Decryption Process ........................................................... 22 3.1.2.4 The Permutation Operation Known Answer Test for the Decryption Process............................................. 23 3.1.2.5 The Substitution Table Known Answer Test for the Decryption Process ................................................... 23 3.2 THE MONTE CARLO TEST ........................................................................................................................ 24 4. BASIC PROTOCOL................................................................................................................................ 26 4.1 OVERVIEW ............................................................................................................................................. 26 4.1.1 Conventions ................................................................................................................................. 26 4.1.2 Message Data Types ..................................................................................................................... 26 4.2 MESSAGE CONTENTS.............................................................................................................................. 27 4.3 INPUT TYPES.......................................................................................................................................... 27 4.3.1 Input Type 1................................................................................................................................. 28 4.3.2 Input Type 2................................................................................................................................. 28 4.3.3 Input Type 3................................................................................................................................. 28 4.3.4 Input Type 4................................................................................................................................. 29 4.3.5 Input Type 5................................................................................................................................. 29 4.3.6 Input Type 6................................................................................................................................. 29 4.3.7 Input Type 7................................................................................................................................. 29 4.3.8 Input Type 8................................................................................................................................. 30 4.3.9 Input Type 9................................................................................................................................. 30

 

Click To View

Additional Books


  • Evaluated Kinetic and Photochemical Data... (by )
  • Toward Next-Generation Construction Mach... (by )
  • Reporting 
  • Secure Cyberspace 
  • Thermodynamic Properties of Dioxygen Dif... (by )
  • Thermodynamic Functions and Properties o... (by )
  • Cross Sections and Related Data for Elec... (by )
  • Cross Sections and Swarm Coefficients fo... (by )
  • Administrative Modifications 
  • Indefinite Delivery Indefinite Quantity ... 
  • Credit Card Purchases 
  • Awards 
Scroll Left
Scroll Right

 



Copyright © World Library Foundation. All rights reserved. eBooks from World eBook Library are sponsored by the World Library Foundation,
a 501c(4) Member's Support Non-Profit Organization, and is NOT affiliated with any governmental agency or department.