622:
650:
41:
It includes a range of encryption products designed by CESG for use in handling confidential (not secret) communications between parts of the
British government, government agencies, and related bodies such as
85:
and
Baltimore Technologies/Zergo Ltd. CESG later specified RAMBUTAN-II, an enhanced system with backward compatibility with existing RAMBUTAN-I infrastructure. The RAMBUTAN-II chip is a 64-pin
164:
146:
602:
432:
182:
54:) which implements the entire cryptosystem and handles the related key distribution and storage tasks. Rambutan is not sold outside the government sector.
161:
143:
270:
97:
rather than a stream. The three 64 bit modes operate at 88 megabits/second. Rambutan operates in three modes: ECB, CBC, and 8 bit CFB.
204:
51:
35:
687:
222:
93:(each in 64 bits) and the cipher feedback mode in 1 or 8 bits. Schneier suggests that these modes may indicate Rambutan is a
263:
232:
179:
706:
90:
50:
system, Rambutan is not available as software: it is distributed only as a self-contained electronic device (an
481:
412:
66:
256:
716:
597:
552:
355:
31:
476:
680:
592:
582:
572:
427:
711:
661:
577:
567:
360:
320:
313:
298:
293:
365:
308:
625:
471:
417:
673:
587:
511:
89:
chip, which implements the electronic codebook, cipher block chaining, and output feedback
201:
8:
340:
456:
440:
382:
113:
516:
506:
372:
228:
47:
16:
Rambutan is a cryptographic chip for confidential communication for the UK government
451:
303:
208:
186:
168:
150:
657:
526:
446:
402:
345:
330:
70:
58:
700:
607:
562:
521:
501:
392:
350:
325:
62:
57:
Technical details of the
Rambutan algorithm are secret. Security researcher
557:
397:
387:
377:
335:
279:
94:
536:
496:
466:
461:
422:
77:
of 112 bits. RAMBUTAN-I communications chips (which implement a secure
23:
486:
43:
531:
491:
74:
144:
Racal
Rambutan SAFE X25 and Rambutan SAFE 2M product descriptions
224:
Applied
Cryptography: Protocols, Algorithms and Source Code in C
27:
649:
407:
81:
based communications system) are made by approved contractors
82:
114:"The use of encryption and related services with the NHSnet"
78:
86:
433:
Cryptographically secure pseudorandom number generator
162:
244:
698:
189:, CESG website, URL retrieved 17 December 2006
681:
264:
688:
674:
271:
257:
197:
195:
126:
124:
122:
28:Communications-Electronics Security Group
220:
155:
656:This cryptography-related article is a
192:
119:
699:
30:(CESG), the technical division of the
252:
134:(2nd ed), John Wiley & Sons, 1996
644:
137:
107:
173:
13:
14:
728:
648:
621:
620:
278:
202:"RAMBUTAN II cryptographic chip"
221:Schneier, Bruce (25 May 2017).
482:Information-theoretic security
214:
73:each of around 80 bits, and a
67:linear-feedback shift register
34:secret communications agency,
26:technologies designed by the
1:
100:
660:. You can help Knowledge by
69:) based cryptosystem with 5
7:
598:Message authentication code
553:Cryptographic hash function
356:Cryptographic hash function
32:United Kingdom government's
10:
733:
643:
477:Harvest now, decrypt later
616:
593:Post-quantum cryptography
545:
286:
248:
227:. John Wiley & Sons.
207:28 September 2007 at the
167:30 September 2007 at the
149:30 September 2007 at the
583:Quantum key distribution
573:Authenticated encryption
428:Random number generation
61:describes it as being a
578:Public-key cryptography
568:Symmetric-key algorithm
361:Key derivation function
321:Cryptographic primitive
314:Authentication protocol
299:Outline of cryptography
294:History of cryptography
185:6 February 2007 at the
707:Cryptographic hardware
366:Secure Hash Algorithms
309:Cryptographic protocol
116:, report by Zergo Ltd.
472:End-to-end encryption
418:Cryptojacking malware
588:Quantum cryptography
512:Trusted timestamping
132:Applied Cryptography
341:Cryptographic nonce
717:Cryptography stubs
457:Subliminal channel
441:Pseudorandom noise
383:Key (cryptography)
669:
668:
638:
637:
634:
633:
517:Key-based routing
507:Trapdoor function
373:Digital signature
87:quad ceramic pack
724:
690:
683:
676:
652:
645:
624:
623:
452:Insecure channel
304:Classical cipher
273:
266:
259:
250:
249:
246:
245:
239:
238:
218:
212:
199:
190:
177:
171:
159:
153:
141:
135:
130:Schneier, Bruce
128:
117:
111:
46:. Unlike CESG's
732:
731:
727:
726:
725:
723:
722:
721:
697:
696:
695:
694:
641:
639:
630:
612:
541:
282:
277:
243:
242:
235:
219:
215:
211:, CESG brochure
209:Wayback Machine
200:
193:
187:Wayback Machine
178:
174:
169:Wayback Machine
160:
156:
151:Wayback Machine
142:
138:
129:
120:
112:
108:
103:
91:operating modes
71:shift registers
22:is a family of
17:
12:
11:
5:
730:
720:
719:
714:
712:Stream ciphers
709:
693:
692:
685:
678:
670:
667:
666:
653:
636:
635:
632:
631:
629:
628:
617:
614:
613:
611:
610:
605:
603:Random numbers
600:
595:
590:
585:
580:
575:
570:
565:
560:
555:
549:
547:
543:
542:
540:
539:
534:
529:
527:Garlic routing
524:
519:
514:
509:
504:
499:
494:
489:
484:
479:
474:
469:
464:
459:
454:
449:
447:Secure channel
444:
438:
437:
436:
425:
420:
415:
410:
405:
403:Key stretching
400:
395:
390:
385:
380:
375:
370:
369:
368:
363:
358:
348:
346:Cryptovirology
343:
338:
333:
331:Cryptocurrency
328:
323:
318:
317:
316:
306:
301:
296:
290:
288:
284:
283:
276:
275:
268:
261:
253:
241:
240:
233:
213:
191:
172:
154:
136:
118:
105:
104:
102:
99:
59:Bruce Schneier
15:
9:
6:
4:
3:
2:
729:
718:
715:
713:
710:
708:
705:
704:
702:
691:
686:
684:
679:
677:
672:
671:
665:
663:
659:
654:
651:
647:
646:
642:
627:
619:
618:
615:
609:
608:Steganography
606:
604:
601:
599:
596:
594:
591:
589:
586:
584:
581:
579:
576:
574:
571:
569:
566:
564:
563:Stream cipher
561:
559:
556:
554:
551:
550:
548:
544:
538:
535:
533:
530:
528:
525:
523:
522:Onion routing
520:
518:
515:
513:
510:
508:
505:
503:
502:Shared secret
500:
498:
495:
493:
490:
488:
485:
483:
480:
478:
475:
473:
470:
468:
465:
463:
460:
458:
455:
453:
450:
448:
445:
442:
439:
434:
431:
430:
429:
426:
424:
421:
419:
416:
414:
411:
409:
406:
404:
401:
399:
396:
394:
393:Key generator
391:
389:
386:
384:
381:
379:
376:
374:
371:
367:
364:
362:
359:
357:
354:
353:
352:
351:Hash function
349:
347:
344:
342:
339:
337:
334:
332:
329:
327:
326:Cryptanalysis
324:
322:
319:
315:
312:
311:
310:
307:
305:
302:
300:
297:
295:
292:
291:
289:
285:
281:
274:
269:
267:
262:
260:
255:
254:
251:
247:
236:
234:9781119439028
230:
226:
225:
217:
210:
206:
203:
198:
196:
188:
184:
181:
180:"RAMBUTAN-II"
176:
170:
166:
163:
158:
152:
148:
145:
140:
133:
127:
125:
123:
115:
110:
106:
98:
96:
92:
88:
84:
80:
76:
72:
68:
64:
63:stream cipher
60:
55:
53:
49:
45:
39:
37:
33:
29:
25:
21:
662:expanding it
655:
640:
558:Block cipher
398:Key schedule
388:Key exchange
378:Kleptography
336:Cryptosystem
280:Cryptography
223:
216:
175:
157:
139:
131:
109:
95:block cipher
56:
40:
19:
18:
546:Mathematics
537:Mix network
701:Categories
497:Ciphertext
467:Decryption
462:Encryption
423:Ransomware
101:References
44:NHS Trusts
24:encryption
487:Plaintext
626:Category
532:Kademlia
492:Codetext
435:(CSPRNG)
413:Machines
205:Archived
183:Archived
165:Archived
147:Archived
75:key size
48:Red Pike
20:Rambutan
287:General
408:Keygen
231:
443:(PRN)
83:Racal
658:stub
229:ISBN
79:X.25
52:ASIC
36:GCHQ
703::
194:^
121:^
38:.
689:e
682:t
675:v
664:.
272:e
265:t
258:v
237:.
65:(
Text is available under the Creative Commons Attribution-ShareAlike License. Additional terms may apply.