Kiwi Specification Version 1.9.03

Terminology

The kiwi 32-bit encrypted message will be called, in this paper, a cookie.

A person attempting to cryptoanalyze this spec will be called a spammer. Each cookie will have 32 bits of encrypted data, and three bits of parity.

Determining the plaintext

The 32 bits of plaintext has two sections:

The header field currently can have one of the following data types:

I have this idea that is not yet implemented:

A chart of Kiwi codes

This is a chart of various headers in the Kiwi spec and the kind of message they indicate. The row is the most significant 4 bits of the first octet of a decoded Kiwi message, and the column is the next 4 bits of the decoded Kiwi message:
0123456789ABCDEF
0 System messages Reserved
1 Reserved
2 Reserved
3 vendor-specific data
4 vendor-specific data
5 vendor-specific data
6 vendor-specific data
7 reserved One-minute password 5-letter message 24-bit IP block One-hour password
8 Short timeout
9 Mid timeout (Usenet messages)
A Long timeout (Email messages)
B Reserved (Usenet messages)
C 28-bit IP block
D Reserved
E Reserved
F Reserved

Calculating the parity

The three parity bits are calculated with the 32-bit plaintext, where each parity bit XORs 1/3 of the bits in the plaintext. The purpose of the parity bits is to make it 8 times as difficult for a spammer to generate a random cookie that decrypts to valid data.

The parity bits are calculated thusly:


        +--+---+--+--+---+--+--+---+--+------- Bit one of parity
        |  |   |  |  |   |  |  |   |  |
        V  V   V  V  V   V  V  V   V  V
Data: xxxxxxxx xxxxxxxx xxxxxxxx xxxxxxxx
      ^^ ^^ ^^  ^^ ^^ ^ ^ ^^ ^^  ^^ ^^ ^^
      || || ||  || || | | || ||  || || ||
      +|-+|-+|--+|-+|-+-|-+|-+|--+|-+|-+|----- Bit two of parity
       |  |  |   |  |   |  |  |   |  |  |
       +--+--+---+--+---+--+--+---+--+--+----- Bit three of parity

Where each bit of parity is an XOR of one third of the bits in the 32-bit plaintext data field. You may also imagine a + in the above diagram as an XOR operation.

Encrypting the plaintext

The plaintext is encrypted with a 32-bit variant of the Blowfish encryption algorithm. In this variant, we can have a key up to 28 bytes (224 bits) long, encrypt blocks that are 32-bits long, and have 16 entries each 16 bits long in the four s-box tables. The s-box tables use a total of 128 bytes, as opposed to 4096 bytes in the full 64-bit blowfish.

We use 16 rounds, and have 18 P-boxes, each of which is 16 bits long. The P-boxes and S-boxes combined take up a total of 164 bytes of memory. As opposed to the 521 encryptions that the full 64-bit Blowfish uses to initialize the P-boxes and S-boxes, this variant of Blowfish only needs to perform 41 encryptions.

The initial values for the P and S boxes are as follows:


S-BOX 1:

0xd131, 0x98df, 0x2ffd, 0xd01a,
0xb8e1, 0x6a26, 0xba7c, 0xf12c,
0x24a1, 0xb391, 0x0801, 0x858e,
0x6369, 0x7157, 0xa458, 0xf493,

S-BOX 2:

0x4b7a, 0xb5b3, 0xdb75, 0xc419,
0xad6e, 0x49a7, 0x9cee, 0x8fed,
0xecaa, 0x699a, 0x5664, 0xc2b1,
0x1936, 0x7509, 0xa059, 0xe418,

S-BOX 3:

0xe93d, 0x9481, 0xf64c, 0x9469,
0x4115, 0x7602, 0xbcf4, 0xd4a2,
0xd408, 0x3320, 0x43b7, 0x5000,
0x1e39, 0x9724, 0x1421, 0xbf8b,

S-BOX 4:

0x3a39, 0xd3fa, 0xabc2, 0x5ac5,
0x5cb0, 0x4fa3, 0xd382, 0x99bc,
0xd511, 0xbf0f, 0xd62d, 0xc700,
0xb78c, 0x21a1, 0xb26e, 0x6a36,

P-BOXes:

0x243f, 0x85a3, 0x1319, 0x0370,
0xa409, 0x299f, 0x082e, 0xec4e,
0x4528, 0x38d0, 0xbe54, 0x34e9,
0xc0ac, 0xc97c, 0x3f84, 0xb547,
0x9216, 0x8979

People with an internet connection may obtain a description of the Blowfish encryption algorithm at this location:

http://www.counterpane.com/bfsverlag.html

Converting the binary ciphertext in to an ASCII cookie

The 32-bits of ciphertext and three bits of parity are converted in to a 7-digit ASCII string. Each digit in the string corresponds to five bits of data in the ciphertext and/or parity.

The 32 bits of ciphertext and three bits of parity are divided thusly:

X: single bit of ciphertext
P: Single bit of parity



                        /+-+++------------- Second byte of ASCII cookie
             /+++-+-----||-|||------------- Byte four of ASCII cookie
  /++++------||||-|-----||-|||------------- Byte six of ASCII cookie
  |||||      |||| |     || |||
  VVVVV      VVVV V     VV VVV
xxXXXXXx xxxxXXXX XxxxxxXX XXXxxxxx PPP
^^     ^ ^^^^      ^^^^^      ^^^^^ ^^^
||     | ||||      |||||      ||||| |||
\+-----|-||||------|||||------|||||-+++---- Byte seven of ASCII cookie
       \-++++------|||||------|||||-------- Byte five of ASCII cookie
                   \++++------|||||-------- Byte three of ASCII cookie
                              \++++-------- First byte of ASCII cookie

In other words, the first bite of the ASCII cookie is determined by the right five bits of the ciphertext. The second byte of the ASCII cookie is determined by the left five bits of the right ten bits of the ciphertext. The third byte of the ASCII cookie is determined by the left five bits of the right 15 bits of the ciphertext. The fourth byte of the ASCII cookie is determined by the left five bits of the right 20 bits of the ciphertext. The fifth and sixth byte of the cookie are determined by similar means.

The seventh, and final, byte of the ASCII cookie is determined by both the left two bits of the ciphertext, and the three bits of parity. The right two bits of the final cookie byte are determined by the left two bits of the ciphertext, where the most significant bit of the ciphertext determines the second-least significant bit of the seventh cookie byte. The left three bits of the final ASCII cookie are determined by the three parity bits, where the left-most bit of the cookie byte is determined by bit one of parity (see parity section above), the second bit from the left in the cookie byte by the second parity bit, and so on.

We convert five bits of binary data into ASCII using the following table:


Binary value    Hex Value    ASCII mapping
--------------  -----------  ---------------
00000           0x00         a
00001           0x01         b
00010           0x02         c
00011           0x03         d
00100           0x04         e
00101           0x05         f
00110           0x06         g
00111           0x07         h
01000           0x08         i
01001           0x09         j
01010           0x0a         k
01011           0x0b         l
01100           0x0c         m
01101           0x0d         n
01110           0x0e         o
01111           0x0f         p
10000           0x10         q
10001           0x11         r
10010           0x12         s
10011           0x13         t
10100           0x14         u
10101           0x15         v
10110           0x16         w
10111           0x17         x
11000           0x18         y
11001           0x19         z
11010           0x1a         2 
11011           0x1b         3
11100           0x1c         4
11101           0x1d         5
11110           0x1e         6
11111           0x1f         7

Note that we do not have the numbers '0' and '1' in the mapping. This is to avoid confusion with the letter 'o' and the number '0', and the letter 'l' and the number '1'.

Test Vectors

Test vectors for the Kiwi specification are available in the file Test_vectors.html.

Password-protected email addresses

For email addresses to give to friends, we have support for special email addresses, in the form joe+password@domain.com (or joe-password@domain.com), where the end user determines the password. Mail sent to a password protected email address will be delivered without attempting to decrypt the cookie.

Care should be taken to not make any password-protected email addresses visible where spammers can obtain the email address. This includes not making the email address visible in Usenet posts, web pages, in finger information, as the address used to subscribe to a mailing list, nor anywhere else a spammer may obtain the email address.