Chapter PDF
Keywords
- Initialisation Vector
- Data Encryption Standard
- Reverse Engineer
- Forgery Attack
- Federal Information Processing Standard
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
American Bankers' Association. ANSI X9.17-1985: Financial Institution Key Management (Wholesale), 1985.
M. Blaze. Personal communication, December 1994.
M. Blaze. Protocol failure in the escrowed encryption standard. In Second ACM Conference on Computer and Communications Security, pages 59–67, November 1994.
E. F. Brickell, D. E. Denning, S. T. Kent, D. P. Maher, and W. Tuchman. SKIP-JACK Review — Interim Report — The SKIPJACK Algorithm, June 1993.
D. E. Denning. Personal communication, August 1993.
D. E. Denning. The Clipper Chip: A Technical Summary, April 1993.
D. E. Denning and M. Smid. Key escrowing today. IEEE Communications Magazine, 32(9), September 1994.
D. Johnson, S. Matyas, A. Le, and J. Wilkins. Design of the commercial data masking facility data privacy algorithm. In Proceedings of the first ACM Conference on Computer and Communications Security, November 1993.
S. Landau. Codes, Keys and Conflicts: Issues in U.S. Crypto Policy. ACM U.S. Public Policy Committee, June 1994.
C. H. Meyer and S. M. Matyas. Cryptography: a new dimension in computer data security. John Wiley and Sons, 1982.
National Bureau of Standards. Federal Information Processing Standard — Publication 46: Data Encryption Standard, 1977.
National Bureau of Standards. Federal Information Processing Standard — Publication 81: DES Modes of Operation, 1977.
M. Roe and M. Lomas. Forging a clipper message. Communications of the ACM, 37(12):12, December 1994.
William Safire. Sink the clipper chip. In New York Times, 14th February 1994.
(UK) Government Communications Headquarters. Review of DEA-1, October 1985.
(U.S.) National Institute of Standards and Technology. Federal Information Processing Standards Publication 185 — Specifications for the Escrowed Encryption Standard, February 1994.
Michael Wiener and Paul van Oorschot. Parallel collision search with application to hash functions and discrete logarithms. In Second ACM Conference on Computer and Communications Security, pages 210–217, November 1994.
Author information
Authors and Affiliations
Editor information
Rights and permissions
Copyright information
© 1995 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Roe, M. (1995). How to reverse engineer an EES device. In: Preneel, B. (eds) Fast Software Encryption. FSE 1994. Lecture Notes in Computer Science, vol 1008. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-60590-8_24
Download citation
DOI: https://doi.org/10.1007/3-540-60590-8_24
Published:
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-60590-4
Online ISBN: 978-3-540-47809-6
eBook Packages: Springer Book Archive