0% found this document useful (0 votes)
132 views

3DES

Double DES has a 112-bit key and encrypts blocks of 64 bits. However, double DES is not as secure as the key length suggests because it is vulnerable to a meet-in-the-middle attack that reduces the security to about 257-bits. Triple DES was developed to prevent such attacks by using three keys for 168-bit security, effectively having 112-bit security. It can operate in two key or three key modes.

Uploaded by

3afrite
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
132 views

3DES

Double DES has a 112-bit key and encrypts blocks of 64 bits. However, double DES is not as secure as the key length suggests because it is vulnerable to a meet-in-the-middle attack that reduces the security to about 257-bits. Triple DES was developed to prevent such attacks by using three keys for 168-bit security, effectively having 112-bit security. It can operate in two key or three key modes.

Uploaded by

3afrite
Copyright
© Attribution Non-Commercial (BY-NC)
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 2

Double DES

p E ( k1 , p ) E ( k 2 , E ( k1 , p ) ) =C
Double DES has a 112-bit key and enciphers blocks of 64 bits. DES is not a group; i.e., E ( k 2 , E ( k1 , p ) ) is not equivalent to DES encryption using a single key. Recall that, for example, the Caesar cipher is a group. If a message were encrypted with the Caesar cipher with a key of 3 and then re-encrypted with the Caesar cipher with a key of 5, the result is equivalent to encrypting the message with the Caesar cipher with a key of 8. For the Caesar cipher, double encryption does not increase security. DES is not a group; double encryption is not equivalent to single encryption. Security does increase by double encryption, but it does not increase much. The security of DES depends on its having a large key space; so large that (at least when it first began being used in the 1970s a brute force attack was not practical [that has now changed]). Recall that DES has a 56-bit key (the key is actually 64 bits, but every 8th bit is a parity check; so, only 56 or the 64 bits are meaningful); therefore, the size of the key space is 256 = 72, 057,594, 037,927,936 . Recall that the algorithm that was originally proposed had a 128-bit key, but the size of the key space was reduced by the NSA (for some reason). Intuitively, double encryption should double the size of the key space. But, that is not the case with DES.

Meet-in-themiddle attack on double encryption This attack requires knowing some plaintext/ciphertext pairs. Lets assume that we have a plaintext/ciphertext pair; i.e., we know the plaintext p and the corresponding (double DES enciphered) ciphertext C. Attacks on DES have typically been brute force attacks (see Breaking DES); so, we will use brute force here. Here is the double encryption:

p E ( k1 , p ) E ( k 2 , E ( k1 , p ) ) =C
Encrypt p using all 256 possible keys, and store the results. (Storage could be a problem.) The stored results will include all possible encryptions p E ( k1 , p ) . Then decrypt C using all 256 possible keys. D ( k 2 , C ) =D k 2 , E ( k 2 , E ( k1 , p ) ) E ( k1 , p )

After decrypting with each key, check for a match with the stored outputs of the 256 possible encryptions. When we have a match, we have located a possibly correct pair of keys. Now, perhaps more than one pair of keys will result in a match, but the number of pairs of keys that return matches should be small. We could try each possible pair of keys. If more than one plaintext/ciphertext correspondence is known (for the key pair), then other correspondences could be used to check which of the keys is correct. So, it only takes twice as long to break double DES using brute force. Because DES has 56-bit security, double DES has 2 256 = 257 security.

Triple DES 3DES 3DES was developed in 1999 by IBM by a team led by Walter Tuchman. 3DES prevents a meet-in-the-middle attack. 3DES has a 168-bit key and enciphers blocks of 64 bits. 3DES effectively has 112-bit security. 3DES can be done with 2 or 3 keys. 3-key encryption E k 3 , D ( k 2 , E ( k1 , p ) ) 2-key encryption E k1 , D ( k 2 , E ( k 1 , p ) )

( (

Why would we want to do decryption as the second step? One reason might be that by taking k 2 =k1 ; 2-key, 3DES becomes single DES with key k1 . 3DES can communicate with single DES.

You might also like