SenSec  uses a variant of skipjack algorithm called skipjack-X for generating the cipher text by introducing one more secret key without affecting the internal structure of the algorithm.
The network uses skipjack algorithm for encryption and decryption process.
Considering 80-bit keys uniform, node is 32 bit long, counter is 8 bit long, the keying and re-keying parameters are 320 bits long and the storage requirement for skipjack algorithm under CBC mode is 21366-bits.
The Fortezza Card (SEE BOX), for example, uses the Skipjack algorithm
, which has eighty-bit keys.
Georgetown University professor Dorothy Denning, one of the evaluators of the Skipjack algorithm used in the proposed key-escrow arrangement and an advocate of its deployment, states that if the technology provided by Clipper catches on, it could become the de facto standard in the U.
Skipjack review interim report: The Skipjack algorithm.
Starting in late June, each of the five experts independently tested the SKIPJACK algorithm
in a variety of ways, looking for potential flaws in the scheme.
While the government had convened a panel of learned cryptologists to examine the classified Skipjack algorithm, it had failed to inspire much confidence among the crypto establishment, most of whom were still disinclined to trust anything they couldn't whack at themselves.
In other words, they don't want devices or software out there that might use the Skipjack algorithm without depositing a key with the escrow holders.
In a recent discussion with a White House official, I asked for his help in getting the NSA to come out of its bunker and engage in direct and open discussions about crypto embargoes, key escrow, the Skipjack algorithm, and the other matters of public interest.
The Clipper Chip, based on the skipjack algorithm
, was developed by the government as a telecommunications encryption device that met law enforcement concerns.