
The Clipper chip is implemented with an encryption algorithm called SKIPJACK. SKIPJACK is a completely specified and classified SECRET by the government.
Clipper chips have the following characteristics:
Each Clipper chip contains the following components:
Encryption with the Clipper Chip
Once the connection is established between two Clipper chips, the chip that started the connection negotiates an 80-bit session key with the chip at the other end. Once the veracity is established, the Clipper chip is used to encrypt the message stream. The telephone security device feeds K and M into the chip to produce two values:
E[M; K], the encryption message stream, and
E[E[K; U] + N; F], a law enforcement field (LEAF),
which are transmitted over the telephone line. The law enforcement field thus contains the session key K encrypted under the unit key U concatenated with the serial number N, all encrypted under the family key F (this is 80 bits for the session key, 25 bits for the serial number, and 23 bits for the authentication pattern for a total of 128 bits). The law enforcement field is decrypted by law enforcement after an authorized wiretap has been installed.
The ciphertext E[M; K] is decrypted by the receiver's
device using the session key: D[E[M; K]; K] = M.
Click on icon to go back to debate.
Click on icon to go back to abstract.
Click on icon to go to
Sources and Acknowledgements.