Pike (cipher): Difference between revisions

From Wikipedia, the free encyclopedia
Jump to navigation Jump to search
imported>Miliwatt
m Squished the lines slightly
 
imported>Miliwatt
m I reformated the decription section and added a hyperlink to 'the Exclusive or' page.
 
Line 4: Line 4:
The cipher combines ideas from [[A5 (cryptography)|A5]] with the [[lagged Fibonacci generator]]s used in FISH. It is about 10% faster than FISH, yet believed to be much stronger. It potentially has a huge [[key length]], and no attacks have been published {{As of|2004|lc=on}}.
The cipher combines ideas from [[A5 (cryptography)|A5]] with the [[lagged Fibonacci generator]]s used in FISH. It is about 10% faster than FISH, yet believed to be much stronger. It potentially has a huge [[key length]], and no attacks have been published {{As of|2004|lc=on}}.


== Inner workings ==
== Description ==


Pike consists of three [[lagged Fibonacci generator]]s with relations
Pike consists of three [[lagged Fibonacci generator]]s with relations
Line 16: Line 16:
The clock control is based on the carry bits.
The clock control is based on the carry bits.
If all carry bits agree we step all three LFG's, otherwise we step the two who do agree.
If all carry bits agree we step all three LFG's, otherwise we step the two who do agree.
This control will be delayed 8 cycles.


This control will be delayed 8 cycles.
The final output is the [[Exclusive Or|XOR]] of the least significant words of all three generators.
The final output is the XOR of the least significant words of all three generators.


== External links ==
== External links ==

Latest revision as of 07:29, 19 June 2025

Template:Short description The Pike stream cipher was invented by Ross Anderson to be a "leaner and meaner" version of FISH after he broke FISH in 1994. Its name is supposed to be a humorous allusion to the pike fish.

The cipher combines ideas from A5 with the lagged Fibonacci generators used in FISH. It is about 10% faster than FISH, yet believed to be much stronger. It potentially has a huge key length, and no attacks have been published Template:As of.

Description

Pike consists of three lagged Fibonacci generators with relations ai=ai55+ai24 (mod 232)[]bi=bi57+bi7 (mod 232)[]ci=ci58+ci19 (mod 232)

The clock control is based on the carry bits. If all carry bits agree we step all three LFG's, otherwise we step the two who do agree. This control will be delayed 8 cycles.

The final output is the XOR of the least significant words of all three generators.

External links

Template:Cryptography navbox


Template:Asbox