Clever Geek Handbook
📜 ⬆️ ⬇️

Oryx (cipher)

ORYX is a stream encryption algorithm with a key length of 96 bits (the export version of the cipher used only 32 bits of the key). Used to protect data in cellular networks such as IS-136 and CDMA2000 . Due to design errors, he used only a 16-bit key. So, having learned the first 25-27 bytes of any data, you can crack it in2sixteen {\ displaystyle 2 ^ {16}} 2 ^ {16} operations. [one]

Content

Algorithm Description

The ORYX cipher consists of four components: three 32-bit RSLOS , which are designated as LFSR A , LFSR B and LFSR K , an S-box containing known permutations of P (values ​​from 0 to 255).

Feedback Functions for LFSR K

x32+x28+xnineteen+x18+xsixteen+x14+xeleven+xten+x9+x6+xfive+x+one{\ displaystyle x ^ {32} + x ^ {28} + x ^ {19} + x ^ {18} + x ^ {16} + x ^ {14} + x ^ {11} + x ^ {10} + x ^ {9} + x ^ {6} + x ^ {5} + x + 1}  

The feedback functions for LFSR A are defined as

x32+x26+x23+x22+xsixteen+x12+xeleven+xten+xeight+x7+xfive+xfour+x2+x+one{\ displaystyle x ^ {32} + x ^ {26} + x ^ {23} + x ^ {22} + x ^ {16} + x ^ {12} + x ^ {11} + x ^ {10} + x ^ {8} + x ^ {7} + x ^ {5} + x ^ {4} + x ^ {2} + x + 1}  

and

x32+x27+x26+x25+x24+x23+x22+x17+x13+xeleven+xten+x9+xeight+x7+x2+x+one{\ displaystyle x ^ {32} + x ^ {27} + x ^ {26} + x ^ {25} + x ^ {24} + x ^ {23} + x ^ {22} + x ^ {17} + x ^ {13} + x ^ {11} + x ^ {10} + x ^ {9} + x ^ {8} + x ^ {7} + x ^ {2} + x + 1}  

Feedback Functions for LFSR B

x32+x31+x21+x20+xsixteen+x15+x6+x3+x+one{\ displaystyle x ^ {32} + x ^ {31} + x ^ {21} + x ^ {20} + x ^ {16} + x ^ {15} + x ^ {6} + x ^ {3} + x + 1}  

Work algorithm:

  1. LFSR K runs once.
  2. LFSR A operates once, with one of the polynomials depending on the state of LFSR K.
  3. LFSR B runs once or twice, depending on the state of LFSR K.
  4. High bytes in LFSR A , LFSR B, and LFSR K are combined into Keystream bytes:

Keystream = {High8K + L [High8A] + L [High8B]} mod 256

See also

  • A5 , used in the GSM cellular standard.

Notes

  1. ↑ [D. Wagner, L. Simpson, E. Dawson, J. Kelsey, W. Millan, and B. Schneier http://www.schneier.com/paper-oryx.pdf “Cryptanalysis of ORYX”], Fifth Annual Workshop on Selected Areas in Cryptography, Springer Verlag, August 1998, to appear.

Links

  • Brief description at Kremlinencrypt.com
  • Cryptanalysis of Mobile Phone Chryptology


Source - https://ru.wikipedia.org/w/index.php?title=Oryx_(cipher)&oldid=97499276


More articles:

  • Loizidis, Lazaros
  • Starogorodskoy District
  • Mazalov, Vladimir Viktorovich
  • Tanet Tier
  • Coat of arms of rural settlement Pyshlitskoe
  • Soyuz-38
  • World Championship in speed skating at some distances 2013 - 1000 meters (men)
  • Ormyrus ermolenkoi
  • Khor Dubai
  • Start (Film Studio)

All articles

Clever Geek | 2019