|
This file is available on a Cryptome DVD offered by Cryptome. Donate $25 for a DVD of the Cryptome 10-year archives of 35,000 files from June 1996 to June 2006 (~3.5 GB). Click Paypal or mail check/MO made out to John Young, 251 West 89th Street, New York, NY 10024. Archives include all files of cryptome.org, cryptome2.org, jya.com, cartome.org, eyeball-series.org and iraq-kill-maim.org. Cryptome offers with the Cryptome DVD an INSCOM DVD of about 18,000 pages of counter-intelligence dossiers declassified by the US Army Information and Security Command, dating from 1945 to 1985. No additional contribution required -- $25 for both. The DVDs will be sent anywhere worldwide without extra cost. |
24 June 1998
To: ukcrypto@maillist.ox.ac.uk Subject: Re: Skipjack KEA Up Date: Wed, 24 Jun 1998 21:55:29 +0000 From: Markus Kuhn <Markus.Kuhn@cl.cam.ac.uk> John Young wrote on 1998-06-24 16:01 UTC: > Others have asked when the code will be released, if ever. > One surmise is that will be done only to encryption vendors > who will be hogtied in the usual fashion. Implementing and testing SKIPJACK from the NIST spec was a simple straightforward ~2 hour programming exercise. Example code is available from http://www.cl.cam.ac.uk/~mgk25/download/skipjack.tar.gz SKIPJACK is not that particularly interesting, except that it looks like it was designed by people who are also responsible for designing brute-force keysearch farms. I found the so far three published papers from AES contributor groups much more exciting. Markus -- Markus G. Kuhn, Security Group, Computer Lab, Cambridge University, UK email: mkuhn at acm.org, home page: <http://www.cl.cam.ac.uk/~mgk25/>
Ouch.