Knowledge (XXG)

SAVILLE

Source đź“ť

1558: 1586: 61:
and statements made by military officials confirm that SAVILLE has a 128-bit key, which consists of 120 key bits and an 8-bit checksum. Furthermore, it is known that SAVILLE has two modes of operation: Autonomous Mode (also known as Key-Auto-KEY or KAK) and Autoclave Mode (also known as Cipher-Text
1538: 1368: 1221: 1156: 237: 983: 339: 40: 1647: 1623: 973: 467: 874: 1136: 1110: 978: 951: 1214: 1120: 230: 999: 1417: 1177: 44: 1207: 267: 1652: 1533: 1488: 1301: 1063: 223: 1412: 1080: 990: 968: 281: 1616: 1528: 1085: 941: 894: 369: 1518: 1508: 1363: 1151: 1033: 908: 277: 70: 51: 30: 20: 118: 63: 1513: 1503: 1306: 1266: 1259: 1249: 1244: 1090: 879: 250: 50:
Little is known publicly about the algorithm itself due to its classified nature and inclusion in the NSA's
1642: 1254: 1182: 1058: 1053: 1005: 138: 134: 130: 86: 82: 854: 142: 1561: 1407: 1353: 1172: 995: 432: 126: 47:
in the US. It is used broadly, often for voice encryption, and implemented in many encryption devices.
1609: 1523: 1447: 1075: 958: 884: 567: 547: 1286: 1038: 1015: 334: 1392: 1376: 1323: 1023: 931: 643: 572: 542: 487: 152: 147: 122: 78: 1452: 1442: 1313: 743: 442: 402: 397: 364: 324: 272: 33: 1593: 158: 1387: 1115: 1010: 889: 748: 628: 597: 291: 962: 946: 935: 869: 828: 793: 723: 703: 577: 457: 452: 407: 111: 1462: 1382: 1343: 1291: 1276: 1100: 1048: 859: 844: 783: 778: 663: 412: 66: 1636: 1543: 1498: 1457: 1437: 1333: 1296: 1271: 1095: 1043: 922: 904: 693: 668: 658: 482: 472: 319: 186: 1493: 1338: 1328: 1318: 1281: 1230: 1028: 849: 813: 678: 557: 512: 344: 296: 246: 36: 202: 1472: 638: 633: 517: 58: 1432: 1402: 1397: 1358: 1070: 788: 728: 612: 607: 552: 422: 285: 164: 1422: 803: 798: 688: 602: 497: 477: 1585: 1467: 1427: 1141: 1105: 899: 562: 437: 417: 329: 808: 718: 708: 653: 648: 492: 301: 1348: 1146: 768: 763: 698: 683: 673: 618: 592: 587: 582: 462: 447: 102: 55: 864: 823: 773: 753: 738: 527: 507: 427: 392: 96: 74: 114:(single-channel land mobile radios) (Saville has algorithm ID 04) 713: 622: 537: 532: 522: 502: 374: 359: 1203: 219: 16:
Classified National Security Agency Type 1 encryption algorithm
818: 733: 354: 349: 1597: 1369:
Cryptographically secure pseudorandom number generator
207: 1481: 1237: 1165: 1129: 918: 837: 383: 310: 258: 92:Some devices and protocols that implement SAVILLE: 187:"Crypto Museum, the SAVILLE encryption algorithm" 39:, developed in the late 1960s, jointly by the 1617: 1215: 231: 163:Motorola's SECURENET encryption module named 41:Government Communications Headquarters (GCHQ) 8: 69:, it runs at 4% of the clock rate (compare 1624: 1610: 1222: 1208: 1200: 238: 224: 216: 212: 208: 1592:This cryptography-related article is a 175: 81:mentions two modes; specifications for 89:specify that they provide Saville I. 7: 1582: 1580: 181: 179: 54:. Some documentation related to the 1596:. You can help Knowledge (XXG) by 14: 1584: 1557: 1556: 203:SAVILLE info at cryptomuseum.com 97:Secure Telephone Equipment (STU) 1418:Information-theoretic security 45:National Security Agency (NSA) 1: 1648:Type 1 encryption algorithms 117:Versatile encryption chips: 1534:Message authentication code 1489:Cryptographic hash function 1302:Cryptographic hash function 62:Auto Key or CTAK). On the 1669: 1579: 1413:Harvest now, decrypt later 18: 1552: 1529:Post-quantum cryptography 1199: 1121:Time/memory/data tradeoff 215: 211: 105:family (voice encryption) 1519:Quantum key distribution 1509:Authenticated encryption 1364:Random number generation 909:Whitening transformation 21:Saville (disambiguation) 1514:Public-key cryptography 1504:Symmetric-key algorithm 1307:Key derivation function 1267:Cryptographic primitive 1260:Authentication protocol 1250:Outline of cryptography 1245:History of cryptography 880:Confusion and diffusion 1255:Cryptographic protocol 108:UK Lamberton (BID/250) 1408:End-to-end encryption 1354:Cryptojacking malware 1173:Initialization vector 1524:Quantum cryptography 1448:Trusted timestamping 952:3-subset MITM attack 568:Intel Cascade Cipher 548:Hasty Pudding cipher 37:encryption algorithm 19:For other uses, see 1287:Cryptographic nonce 991:Differential-linear 155:(also known as DBT) 1653:Cryptography stubs 1393:Subliminal channel 1377:Pseudorandom noise 1324:Key (cryptography) 1064:Differential-fault 282:internal mechanics 43:in the UK and the 1605: 1604: 1574: 1573: 1570: 1569: 1453:Key-based routing 1443:Trapdoor function 1314:Digital signature 1195: 1194: 1191: 1190: 1178:Mode of operation 855:Lai–Massey scheme 1660: 1626: 1619: 1612: 1588: 1581: 1560: 1559: 1388:Insecure channel 1224: 1217: 1210: 1201: 1049:Power-monitoring 890:Avalanche effect 598:Khufu and Khafre 251:security summary 240: 233: 226: 217: 213: 209: 191: 190: 183: 29:is a classified 1668: 1667: 1663: 1662: 1661: 1659: 1658: 1657: 1633: 1632: 1631: 1630: 1577: 1575: 1566: 1548: 1477: 1233: 1228: 1187: 1161: 1130:Standardization 1125: 1054:Electromagnetic 1006:Integral/Square 963:Piling-up lemma 947:Biclique attack 936:EFF DES cracker 920: 914: 845:Feistel network 833: 458:CIPHERUNICORN-E 453:CIPHERUNICORN-A 385: 379: 312: 306: 260: 254: 244: 199: 194: 185: 184: 177: 173: 112:APCO Project 25 77:at 129%). The 24: 17: 12: 11: 5: 1666: 1664: 1656: 1655: 1650: 1645: 1635: 1634: 1629: 1628: 1621: 1614: 1606: 1603: 1602: 1589: 1572: 1571: 1568: 1567: 1565: 1564: 1553: 1550: 1549: 1547: 1546: 1541: 1539:Random numbers 1536: 1531: 1526: 1521: 1516: 1511: 1506: 1501: 1496: 1491: 1485: 1483: 1479: 1478: 1476: 1475: 1470: 1465: 1463:Garlic routing 1460: 1455: 1450: 1445: 1440: 1435: 1430: 1425: 1420: 1415: 1410: 1405: 1400: 1395: 1390: 1385: 1383:Secure channel 1380: 1374: 1373: 1372: 1361: 1356: 1351: 1346: 1344:Key stretching 1341: 1336: 1331: 1326: 1321: 1316: 1311: 1310: 1309: 1304: 1294: 1292:Cryptovirology 1289: 1284: 1279: 1277:Cryptocurrency 1274: 1269: 1264: 1263: 1262: 1252: 1247: 1241: 1239: 1235: 1234: 1229: 1227: 1226: 1219: 1212: 1204: 1197: 1196: 1193: 1192: 1189: 1188: 1186: 1185: 1180: 1175: 1169: 1167: 1163: 1162: 1160: 1159: 1154: 1149: 1144: 1139: 1133: 1131: 1127: 1126: 1124: 1123: 1118: 1113: 1108: 1103: 1098: 1093: 1088: 1083: 1078: 1073: 1068: 1067: 1066: 1061: 1056: 1051: 1046: 1036: 1031: 1026: 1021: 1013: 1008: 1003: 996:Distinguishing 993: 988: 987: 986: 981: 976: 966: 956: 955: 954: 949: 939: 928: 926: 916: 915: 913: 912: 902: 897: 892: 887: 882: 877: 872: 867: 862: 860:Product cipher 857: 852: 847: 841: 839: 835: 834: 832: 831: 826: 821: 816: 811: 806: 801: 796: 791: 786: 781: 776: 771: 766: 761: 756: 751: 746: 741: 736: 731: 726: 721: 716: 711: 706: 701: 696: 691: 686: 681: 676: 671: 666: 661: 656: 651: 646: 641: 636: 631: 626: 615: 610: 605: 600: 595: 590: 585: 580: 575: 570: 565: 560: 555: 550: 545: 540: 535: 530: 525: 520: 515: 510: 505: 500: 495: 490: 488:Cryptomeria/C2 485: 480: 475: 470: 465: 460: 455: 450: 445: 440: 435: 430: 425: 420: 415: 410: 405: 400: 395: 389: 387: 381: 380: 378: 377: 372: 367: 362: 357: 352: 347: 342: 337: 332: 327: 322: 316: 314: 308: 307: 305: 304: 299: 294: 289: 275: 270: 264: 262: 256: 255: 245: 243: 242: 235: 228: 220: 206: 205: 198: 197:External links 195: 193: 192: 174: 172: 169: 168: 167: 161: 156: 150: 145: 115: 109: 106: 99: 15: 13: 10: 9: 6: 4: 3: 2: 1665: 1654: 1651: 1649: 1646: 1644: 1643:Block ciphers 1641: 1640: 1638: 1627: 1622: 1620: 1615: 1613: 1608: 1607: 1601: 1599: 1595: 1590: 1587: 1583: 1578: 1563: 1555: 1554: 1551: 1545: 1544:Steganography 1542: 1540: 1537: 1535: 1532: 1530: 1527: 1525: 1522: 1520: 1517: 1515: 1512: 1510: 1507: 1505: 1502: 1500: 1499:Stream cipher 1497: 1495: 1492: 1490: 1487: 1486: 1484: 1480: 1474: 1471: 1469: 1466: 1464: 1461: 1459: 1458:Onion routing 1456: 1454: 1451: 1449: 1446: 1444: 1441: 1439: 1438:Shared secret 1436: 1434: 1431: 1429: 1426: 1424: 1421: 1419: 1416: 1414: 1411: 1409: 1406: 1404: 1401: 1399: 1396: 1394: 1391: 1389: 1386: 1384: 1381: 1378: 1375: 1370: 1367: 1366: 1365: 1362: 1360: 1357: 1355: 1352: 1350: 1347: 1345: 1342: 1340: 1337: 1335: 1334:Key generator 1332: 1330: 1327: 1325: 1322: 1320: 1317: 1315: 1312: 1308: 1305: 1303: 1300: 1299: 1298: 1297:Hash function 1295: 1293: 1290: 1288: 1285: 1283: 1280: 1278: 1275: 1273: 1272:Cryptanalysis 1270: 1268: 1265: 1261: 1258: 1257: 1256: 1253: 1251: 1248: 1246: 1243: 1242: 1240: 1236: 1232: 1225: 1220: 1218: 1213: 1211: 1206: 1205: 1202: 1198: 1184: 1181: 1179: 1176: 1174: 1171: 1170: 1168: 1164: 1158: 1155: 1153: 1150: 1148: 1145: 1143: 1140: 1138: 1135: 1134: 1132: 1128: 1122: 1119: 1117: 1114: 1112: 1109: 1107: 1104: 1102: 1099: 1097: 1094: 1092: 1089: 1087: 1084: 1082: 1079: 1077: 1076:Interpolation 1074: 1072: 1069: 1065: 1062: 1060: 1057: 1055: 1052: 1050: 1047: 1045: 1042: 1041: 1040: 1037: 1035: 1032: 1030: 1027: 1025: 1022: 1020: 1019: 1014: 1012: 1009: 1007: 1004: 1001: 997: 994: 992: 989: 985: 982: 980: 977: 975: 972: 971: 970: 967: 964: 960: 957: 953: 950: 948: 945: 944: 943: 940: 937: 933: 930: 929: 927: 924: 923:cryptanalysis 917: 910: 906: 905:Key whitening 903: 901: 898: 896: 893: 891: 888: 886: 883: 881: 878: 876: 873: 871: 868: 866: 863: 861: 858: 856: 853: 851: 848: 846: 843: 842: 840: 836: 830: 827: 825: 822: 820: 817: 815: 812: 810: 807: 805: 802: 800: 797: 795: 792: 790: 787: 785: 782: 780: 777: 775: 772: 770: 767: 765: 762: 760: 757: 755: 752: 750: 747: 745: 742: 740: 737: 735: 732: 730: 727: 725: 722: 720: 717: 715: 712: 710: 707: 705: 702: 700: 697: 695: 694:New Data Seal 692: 690: 687: 685: 682: 680: 677: 675: 672: 670: 667: 665: 662: 660: 657: 655: 652: 650: 647: 645: 642: 640: 637: 635: 632: 630: 627: 624: 620: 616: 614: 611: 609: 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 569: 566: 564: 561: 559: 556: 554: 551: 549: 546: 544: 541: 539: 536: 534: 531: 529: 526: 524: 521: 519: 516: 514: 511: 509: 506: 504: 501: 499: 496: 494: 491: 489: 486: 484: 481: 479: 476: 474: 471: 469: 466: 464: 461: 459: 456: 454: 451: 449: 446: 444: 441: 439: 436: 434: 433:BEAR and LION 431: 429: 426: 424: 421: 419: 416: 414: 411: 409: 406: 404: 401: 399: 396: 394: 391: 390: 388: 382: 376: 373: 371: 368: 366: 363: 361: 358: 356: 353: 351: 348: 346: 343: 341: 338: 336: 333: 331: 328: 326: 323: 321: 318: 317: 315: 309: 303: 300: 298: 295: 293: 290: 287: 283: 279: 276: 274: 271: 269: 266: 265: 263: 257: 252: 248: 247:Block ciphers 241: 236: 234: 229: 227: 222: 221: 218: 214: 210: 204: 201: 200: 196: 188: 182: 180: 176: 170: 166: 162: 160: 157: 154: 151: 149: 146: 144: 140: 136: 132: 128: 124: 120: 116: 113: 110: 107: 104: 100: 98: 95: 94: 93: 90: 88: 84: 80: 76: 72: 68: 65: 60: 57: 53: 48: 46: 42: 38: 35: 32: 28: 22: 1598:expanding it 1591: 1576: 1494:Block cipher 1339:Key schedule 1329:Key exchange 1319:Kleptography 1282:Cryptosystem 1231:Cryptography 1081:Partitioning 1039:Side-channel 1017: 984:Higher-order 969:Differential 850:Key schedule 758: 159:Elcrovox 1/4 91: 49: 26: 25: 1482:Mathematics 1473:Mix network 1166:Utilization 1152:NSA Suite B 1137:AES process 1086:Rubber-hose 1024:Related-key 932:Brute-force 311:Less common 127:Sierra I/II 79:Cypris chip 73:at 76% and 59:fill device 1637:Categories 1433:Ciphertext 1403:Decryption 1398:Encryption 1359:Ransomware 1116:Chi-square 1034:Rotational 974:Impossible 895:Block size 789:Spectr-H64 613:Ladder-DES 608:Kuznyechik 553:Hierocrypt 423:BassOmatic 386:algorithms 313:algorithms 286:Triple DES 261:algorithms 171:References 165:FASCINATOR 153:Spendex 50 148:Spendex 40 1423:Plaintext 1091:Black-bag 1011:Boomerang 1000:Known-key 979:Truncated 804:Threefish 799:SXAL/MBAL 689:MultiSwap 644:MacGuffin 603:KN-Cipher 543:Grand Cru 498:CS-Cipher 478:COCONUT98 67:microchip 1562:Category 1468:Kademlia 1428:Codetext 1371:(CSPRNG) 1142:CRYPTREC 1106:Weak key 1059:Acoustic 900:Key size 744:Red Pike 563:IDEA NXT 443:Chiasmus 438:CAST-256 418:BaseKing 403:Akelarre 398:Adiantum 365:Skipjack 330:CAST-128 325:Camellia 273:Blowfish 139:Presidio 135:Indictor 131:Windster 87:Indictor 83:Windster 1238:General 1183:Padding 1101:Rebound 809:Treyfer 759:SAVILLE 719:PRESENT 709:NOEKEON 654:MAGENTA 649:Madryga 629:Lucifer 493:CRYPTON 302:Twofish 292:Serpent 143:Railman 52:Suite A 27:SAVILLE 1349:Keygen 1147:NESSIE 1096:Davies 1044:Timing 959:Linear 919:Attack 838:Design 829:Zodiac 794:Square 769:SHACAL 764:SC2000 724:Prince 704:Nimbus 699:NewDES 684:MULTI2 674:MISTY1 617:LOKI ( 593:KHAZAD 588:KeeLoq 583:KASUMI 578:Kalyna 463:CLEFIA 448:CIKS-1 408:Anubis 259:Common 123:Cypris 103:VINSON 56:KYK-13 34:Type 1 1379:(PRN) 1029:Slide 885:Round 870:P-box 865:S-box 824:XXTEA 784:Speck 779:Simon 774:SHARK 754:SAFER 739:REDOC 664:Mercy 623:89/91 573:Iraqi 538:G-DES 528:FEA-M 508:DES-X 473:Cobra 428:BATON 413:Ascon 393:3-Way 384:Other 75:BATON 1594:stub 1157:CNSA 1016:Mod 942:MITM 714:NUSH 669:MESH 659:MARS 533:FROG 523:FEAL 503:DEAL 483:Crab 468:CMEA 375:XTEA 360:SEED 340:IDEA 335:GOST 320:ARIA 101:The 85:and 1111:Tau 1071:XSL 875:SPN 819:xmx 814:UES 749:S-1 734:RC2 679:MMB 558:ICE 513:DFC 370:TEA 355:RC6 350:RC5 345:LEA 297:SM4 278:DES 268:AES 119:AIM 71:DES 64:AIM 31:NSA 1639:: 639:M8 634:M6 621:, 619:97 518:E2 284:, 178:^ 141:, 137:, 133:, 129:, 125:, 121:, 1625:e 1618:t 1611:v 1600:. 1223:e 1216:t 1209:v 1018:n 1002:) 998:( 965:) 961:( 938:) 934:( 925:) 921:( 911:) 907:( 729:Q 625:) 288:) 280:( 253:) 249:( 239:e 232:t 225:v 189:. 23:.

Index

Saville (disambiguation)
NSA
Type 1
encryption algorithm
Government Communications Headquarters (GCHQ)
National Security Agency (NSA)
Suite A
KYK-13
fill device
AIM
microchip
DES
BATON
Cypris chip
Windster
Indictor
Secure Telephone Equipment (STU)
VINSON
APCO Project 25
AIM
Cypris
Sierra I/II
Windster
Indictor
Presidio
Railman
Spendex 40
Spendex 50
Elcrovox 1/4
FASCINATOR

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.

↑