Knowledge

Rambutan (cryptography)

Source 📝

622: 650: 41:
It includes a range of encryption products designed by CESG for use in handling confidential (not secret) communications between parts of the British government, government agencies, and related bodies such as
85:
and Baltimore Technologies/Zergo Ltd. CESG later specified RAMBUTAN-II, an enhanced system with backward compatibility with existing RAMBUTAN-I infrastructure. The RAMBUTAN-II chip is a 64-pin
164: 146: 602: 432: 182: 54:) which implements the entire cryptosystem and handles the related key distribution and storage tasks. Rambutan is not sold outside the government sector. 161: 143: 270: 97:
rather than a stream. The three 64 bit modes operate at 88 megabits/second. Rambutan operates in three modes: ECB, CBC, and 8 bit CFB.
204: 51: 35: 687: 222: 93:(each in 64 bits) and the cipher feedback mode in 1 or 8 bits. Schneier suggests that these modes may indicate Rambutan is a 263: 232: 179: 706: 90: 50:
system, Rambutan is not available as software: it is distributed only as a self-contained electronic device (an
481: 412: 66: 256: 716: 597: 552: 355: 31: 476: 680: 592: 582: 572: 427: 711: 661: 577: 567: 360: 320: 313: 298: 293: 365: 308: 625: 471: 417: 673: 587: 511: 89:
chip, which implements the electronic codebook, cipher block chaining, and output feedback
201: 8: 340: 456: 440: 382: 113: 516: 506: 372: 228: 47: 16:
Rambutan is a cryptographic chip for confidential communication for the UK government
451: 303: 208: 186: 168: 150: 657: 526: 446: 402: 345: 330: 70: 58: 700: 607: 562: 521: 501: 392: 350: 325: 62: 57:
Technical details of the Rambutan algorithm are secret. Security researcher
557: 397: 387: 377: 335: 279: 94: 536: 496: 466: 461: 422: 77:
of 112 bits. RAMBUTAN-I communications chips (which implement a secure
23: 486: 43: 531: 491: 74: 144:
Racal Rambutan SAFE X25 and Rambutan SAFE 2M product descriptions
224:
Applied Cryptography: Protocols, Algorithms and Source Code in C
27: 649: 407: 81:
based communications system) are made by approved contractors
82: 114:"The use of encryption and related services with the NHSnet" 78: 86: 433:
Cryptographically secure pseudorandom number generator
162:
Baltimore Technologies (UK) approved Rambutan devices
244: 698: 189:, CESG website, URL retrieved 17 December 2006 681: 264: 688: 674: 271: 257: 197: 195: 126: 124: 122: 28:Communications-Electronics Security Group 220: 155: 656:This cryptography-related article is a 192: 119: 699: 30:(CESG), the technical division of the 252: 134:(2nd ed), John Wiley & Sons, 1996 644: 137: 107: 173: 13: 14: 728: 648: 621: 620: 278: 202:"RAMBUTAN II cryptographic chip" 221:Schneier, Bruce (25 May 2017). 482:Information-theoretic security 214: 73:each of around 80 bits, and a 67:linear-feedback shift register 34:secret communications agency, 26:technologies designed by the 1: 100: 660:. You can help Knowledge by 69:) based cryptosystem with 5 7: 598:Message authentication code 553:Cryptographic hash function 356:Cryptographic hash function 32:United Kingdom government's 10: 733: 643: 477:Harvest now, decrypt later 616: 593:Post-quantum cryptography 545: 286: 248: 227:. John Wiley & Sons. 207:28 September 2007 at the 167:30 September 2007 at the 149:30 September 2007 at the 583:Quantum key distribution 573:Authenticated encryption 428:Random number generation 61:describes it as being a 578:Public-key cryptography 568:Symmetric-key algorithm 361:Key derivation function 321:Cryptographic primitive 314:Authentication protocol 299:Outline of cryptography 294:History of cryptography 185:6 February 2007 at the 707:Cryptographic hardware 366:Secure Hash Algorithms 309:Cryptographic protocol 116:, report by Zergo Ltd. 472:End-to-end encryption 418:Cryptojacking malware 588:Quantum cryptography 512:Trusted timestamping 132:Applied Cryptography 341:Cryptographic nonce 717:Cryptography stubs 457:Subliminal channel 441:Pseudorandom noise 383:Key (cryptography) 669: 668: 638: 637: 634: 633: 517:Key-based routing 507:Trapdoor function 373:Digital signature 87:quad ceramic pack 724: 690: 683: 676: 652: 645: 624: 623: 452:Insecure channel 304:Classical cipher 273: 266: 259: 250: 249: 246: 245: 239: 238: 218: 212: 199: 190: 177: 171: 159: 153: 141: 135: 130:Schneier, Bruce 128: 117: 111: 46:. Unlike CESG's 732: 731: 727: 726: 725: 723: 722: 721: 697: 696: 695: 694: 641: 639: 630: 612: 541: 282: 277: 243: 242: 235: 219: 215: 211:, CESG brochure 209:Wayback Machine 200: 193: 187:Wayback Machine 178: 174: 169:Wayback Machine 160: 156: 151:Wayback Machine 142: 138: 129: 120: 112: 108: 103: 91:operating modes 71:shift registers 22:is a family of 17: 12: 11: 5: 730: 720: 719: 714: 712:Stream ciphers 709: 693: 692: 685: 678: 670: 667: 666: 653: 636: 635: 632: 631: 629: 628: 617: 614: 613: 611: 610: 605: 603:Random numbers 600: 595: 590: 585: 580: 575: 570: 565: 560: 555: 549: 547: 543: 542: 540: 539: 534: 529: 527:Garlic routing 524: 519: 514: 509: 504: 499: 494: 489: 484: 479: 474: 469: 464: 459: 454: 449: 447:Secure channel 444: 438: 437: 436: 425: 420: 415: 410: 405: 403:Key stretching 400: 395: 390: 385: 380: 375: 370: 369: 368: 363: 358: 348: 346:Cryptovirology 343: 338: 333: 331:Cryptocurrency 328: 323: 318: 317: 316: 306: 301: 296: 290: 288: 284: 283: 276: 275: 268: 261: 253: 241: 240: 233: 213: 191: 172: 154: 136: 118: 105: 104: 102: 99: 59:Bruce Schneier 15: 9: 6: 4: 3: 2: 729: 718: 715: 713: 710: 708: 705: 704: 702: 691: 686: 684: 679: 677: 672: 671: 665: 663: 659: 654: 651: 647: 646: 642: 627: 619: 618: 615: 609: 608:Steganography 606: 604: 601: 599: 596: 594: 591: 589: 586: 584: 581: 579: 576: 574: 571: 569: 566: 564: 563:Stream cipher 561: 559: 556: 554: 551: 550: 548: 544: 538: 535: 533: 530: 528: 525: 523: 522:Onion routing 520: 518: 515: 513: 510: 508: 505: 503: 502:Shared secret 500: 498: 495: 493: 490: 488: 485: 483: 480: 478: 475: 473: 470: 468: 465: 463: 460: 458: 455: 453: 450: 448: 445: 442: 439: 434: 431: 430: 429: 426: 424: 421: 419: 416: 414: 411: 409: 406: 404: 401: 399: 396: 394: 393:Key generator 391: 389: 386: 384: 381: 379: 376: 374: 371: 367: 364: 362: 359: 357: 354: 353: 352: 351:Hash function 349: 347: 344: 342: 339: 337: 334: 332: 329: 327: 326:Cryptanalysis 324: 322: 319: 315: 312: 311: 310: 307: 305: 302: 300: 297: 295: 292: 291: 289: 285: 281: 274: 269: 267: 262: 260: 255: 254: 251: 247: 236: 234:9781119439028 230: 226: 225: 217: 210: 206: 203: 198: 196: 188: 184: 181: 180:"RAMBUTAN-II" 176: 170: 166: 163: 158: 152: 148: 145: 140: 133: 127: 125: 123: 115: 110: 106: 98: 96: 92: 88: 84: 80: 76: 72: 68: 64: 63:stream cipher 60: 55: 53: 49: 45: 39: 37: 33: 29: 25: 21: 662:expanding it 655: 640: 558:Block cipher 398:Key schedule 388:Key exchange 378:Kleptography 336:Cryptosystem 280:Cryptography 223: 216: 175: 157: 139: 131: 109: 95:block cipher 56: 40: 19: 18: 546:Mathematics 537:Mix network 701:Categories 497:Ciphertext 467:Decryption 462:Encryption 423:Ransomware 101:References 44:NHS Trusts 24:encryption 487:Plaintext 626:Category 532:Kademlia 492:Codetext 435:(CSPRNG) 413:Machines 205:Archived 183:Archived 165:Archived 147:Archived 75:key size 48:Red Pike 20:Rambutan 287:General 408:Keygen 231:  443:(PRN) 83:Racal 658:stub 229:ISBN 79:X.25 52:ASIC 36:GCHQ 703:: 194:^ 121:^ 38:. 689:e 682:t 675:v 664:. 272:e 265:t 258:v 237:. 65:(

Index

encryption
Communications-Electronics Security Group
United Kingdom government's
GCHQ
NHS Trusts
Red Pike
ASIC
Bruce Schneier
stream cipher
linear-feedback shift register
shift registers
key size
X.25
Racal
quad ceramic pack
operating modes
block cipher
"The use of encryption and related services with the NHSnet"



Racal Rambutan SAFE X25 and Rambutan SAFE 2M product descriptions
Archived
Wayback Machine
Baltimore Technologies (UK) approved Rambutan devices
Archived
Wayback Machine
"RAMBUTAN-II"
Archived
Wayback Machine

Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.