SlideShare a Scribd company logo
Double DES

                         p → E ( k1 , p ) → E ( k 2 , E ( k1 , p ) ) =C

Double DES has a 112-bit key and enciphers blocks of 64 bits.

DES is not a group; i.e., E ( k 2 , E ( k1 , p ) ) is not equivalent to DES encryption using a
single key. Recall that, for example, the Caesar cipher is a group. If a message were
encrypted with the Caesar cipher with a key of 3 and then re-encrypted with the Caesar
cipher with a key of 5, the result is equivalent to encrypting the message with the Caesar
cipher with a key of 8. For the Caesar cipher, double encryption does not increase
security. DES is not a group; double encryption is not equivalent to single encryption.
Security does increase by double encryption, but it does not increase much.

The security of DES depends on its having a large key space; so large that (at least when
it first began being used in the 1970’s a brute force attack was not practical [that has now
changed]). Recall that DES has a 56-bit key (the key is actually 64 bits, but every 8th bit
is a parity check; so, only 56 or the 64 bits are meaningful); therefore, the size of the key
space is 256 = 72, 057,594, 037,927,936 . Recall that the algorithm that was originally
proposed had a 128-bit key, but the size of the key space was reduced by the NSA (for
some reason).

Intuitively, double encryption should double the size of the key space. But, that is not the
case with DES.


Meet-in-the–middle attack on double encryption

This attack requires knowing some plaintext/ciphertext pairs. Let’s assume that we have
a plaintext/ciphertext pair; i.e., we know the plaintext p and the corresponding (double
DES enciphered) ciphertext C. Attacks on DES have typically been brute force attacks
(see “Breaking DES”); so, we will use brute force here.

Here is the double encryption:

                         p → E ( k1 , p ) → E ( k 2 , E ( k1 , p ) ) =C

Encrypt p using all 256 possible keys, and store the results. (Storage could be a problem.)
The stored results will include all possible encryptions p → E ( k1 , p ) .

Then decrypt C using all 256 possible keys.

                                  (                            )
                  D ( k 2 , C ) =D k 2 , E ( k 2 , E ( k1 , p ) ) → E ( k1 , p )
After decrypting with each key, check for a match with the stored outputs of the 256
possible encryptions. When we have a match, we have located a possibly correct pair of
keys. Now, perhaps more than one pair of keys will result in a match, but the number of
pairs of keys that return matches should be small. We could try each possible pair of
keys. If more than one plaintext/ciphertext correspondence is known (for the key pair),
then other correspondences could be used to check which of the keys is correct.

So, it only takes twice as long to break double DES using brute force. Because DES has
56-bit security, double DES has 2 × 256 = 257 security.


Triple DES – 3DES

3DES was developed in 1999 by IBM – by a team led by Walter Tuchman. 3DES
prevents a meet-in-the-middle attack. 3DES has a 168-bit key and enciphers blocks of 64
bits. 3DES effectively has 112-bit security.

3DES can be done with 2 or 3 keys.

3-key encryption

                                (
                              E k 3 , D ( k 2 , E ( k1 , p ) )   )
2-key encryption

                                (
                              E k1 , D ( k 2 , E ( k 1 , p ) )   )
Why would we want to do decryption as the second step? One reason might be that by
taking k 2 =k1 ; 2-key, 3DES becomes single DES with key k1 . 3DES can communicate
with single DES.

More Related Content

PPTX
Double DES & Triple DES
PPT
Design and Simulation Triple-DES
PDF
An Introduction to RSA Public-Key Cryptography
PPT
12 symmetric key cryptography
PPTX
Trible data encryption standard (3DES)
PPT
(Crypto) DES And RSA Algorithms Overview
PDF
Triple Data Encryption Standard (t-DES)
PPTX
ASIC Implementation of Triple Data Encryption Algorithm (3DES)
Double DES & Triple DES
Design and Simulation Triple-DES
An Introduction to RSA Public-Key Cryptography
12 symmetric key cryptography
Trible data encryption standard (3DES)
(Crypto) DES And RSA Algorithms Overview
Triple Data Encryption Standard (t-DES)
ASIC Implementation of Triple Data Encryption Algorithm (3DES)

What's hot (20)

PDF
Classical encryption techniques
PPT
introduction to cryptography
PPT
Classical Encryption Techniques in Network Security
PPT
13 asymmetric key cryptography
PPT
Introduction to cryptography
PDF
Everything I always wanted to know about crypto, but never thought I'd unders...
PPTX
FormacaoCrypto
PPTX
Cryptographic Algorithms: DES and RSA
PDF
Cryptography Attacks and Applications
PPTX
Cryptography
PPTX
Data Encryption Standard (DES)
PPTX
Secret key cryptography
PPTX
Information and network security 27 triple des
PPT
Network security attacks
PDF
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
PPTX
Cryptography using rsa cryptosystem
PPTX
Classical encryption techniques
Classical encryption techniques
introduction to cryptography
Classical Encryption Techniques in Network Security
13 asymmetric key cryptography
Introduction to cryptography
Everything I always wanted to know about crypto, but never thought I'd unders...
FormacaoCrypto
Cryptographic Algorithms: DES and RSA
Cryptography Attacks and Applications
Cryptography
Data Encryption Standard (DES)
Secret key cryptography
Information and network security 27 triple des
Network security attacks
Symmetric Cipher Model, Substitution techniques, Transposition techniques, St...
Cryptography using rsa cryptosystem
Classical encryption techniques
Ad

Viewers also liked (12)

PDF
Functional resume j bowman busato april 2014final
PDF
Baromètres des taux régionaux mai 2014
DOCX
Hoteles 5 estrellas
DOCX
Core units evidence sheet biggs-rayner
PDF
DOC
Igeriketa sinkronizatua iraia
PDF
A Gijón sí le interesa Europa
PDF
Emergency Shower and Eyewash Station
DOCX
расписание консультаций 9 кл.
PPT
Kastoria
Functional resume j bowman busato april 2014final
Baromètres des taux régionaux mai 2014
Hoteles 5 estrellas
Core units evidence sheet biggs-rayner
Igeriketa sinkronizatua iraia
A Gijón sí le interesa Europa
Emergency Shower and Eyewash Station
расписание консультаций 9 кл.
Kastoria
Ad

Similar to 3 des (20)

PDF
double_des___triple_des in network security_1.pdf
PPTX
CNS_Team_5.pptx
PPT
Stallings Kurose and Ross
PPT
02 Information System Security
PPTX
Cryptography in discrete structure .pptx
PDF
Mifare Desfire Technology
PPT
Jaimin chp-8 - network security-new -use this - 2011 batch
PPT
4255596.ppt
PPT
Data security in data communication
DOCX
Cybersecurity Research Paper
PPTX
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
PPT
MKG_ISS_04.ppt
PPTX
Cryptography and network security
PPTX
encryption and decryption ,and its types
PPT
Network security
PPTX
Cryptography and applications
PPT
Cupdf.com public key-cryptography-569692953829a
PPT
crypto1.ppt
double_des___triple_des in network security_1.pdf
CNS_Team_5.pptx
Stallings Kurose and Ross
02 Information System Security
Cryptography in discrete structure .pptx
Mifare Desfire Technology
Jaimin chp-8 - network security-new -use this - 2011 batch
4255596.ppt
Data security in data communication
Cybersecurity Research Paper
Encryption/Decryption Algorithm for Devanagri Script(Affine Cipher)
MKG_ISS_04.ppt
Cryptography and network security
encryption and decryption ,and its types
Network security
Cryptography and applications
Cupdf.com public key-cryptography-569692953829a
crypto1.ppt

3 des

  • 1. Double DES p → E ( k1 , p ) → E ( k 2 , E ( k1 , p ) ) =C Double DES has a 112-bit key and enciphers blocks of 64 bits. DES is not a group; i.e., E ( k 2 , E ( k1 , p ) ) is not equivalent to DES encryption using a single key. Recall that, for example, the Caesar cipher is a group. If a message were encrypted with the Caesar cipher with a key of 3 and then re-encrypted with the Caesar cipher with a key of 5, the result is equivalent to encrypting the message with the Caesar cipher with a key of 8. For the Caesar cipher, double encryption does not increase security. DES is not a group; double encryption is not equivalent to single encryption. Security does increase by double encryption, but it does not increase much. The security of DES depends on its having a large key space; so large that (at least when it first began being used in the 1970’s a brute force attack was not practical [that has now changed]). Recall that DES has a 56-bit key (the key is actually 64 bits, but every 8th bit is a parity check; so, only 56 or the 64 bits are meaningful); therefore, the size of the key space is 256 = 72, 057,594, 037,927,936 . Recall that the algorithm that was originally proposed had a 128-bit key, but the size of the key space was reduced by the NSA (for some reason). Intuitively, double encryption should double the size of the key space. But, that is not the case with DES. Meet-in-the–middle attack on double encryption This attack requires knowing some plaintext/ciphertext pairs. Let’s assume that we have a plaintext/ciphertext pair; i.e., we know the plaintext p and the corresponding (double DES enciphered) ciphertext C. Attacks on DES have typically been brute force attacks (see “Breaking DES”); so, we will use brute force here. Here is the double encryption: p → E ( k1 , p ) → E ( k 2 , E ( k1 , p ) ) =C Encrypt p using all 256 possible keys, and store the results. (Storage could be a problem.) The stored results will include all possible encryptions p → E ( k1 , p ) . Then decrypt C using all 256 possible keys. ( ) D ( k 2 , C ) =D k 2 , E ( k 2 , E ( k1 , p ) ) → E ( k1 , p )
  • 2. After decrypting with each key, check for a match with the stored outputs of the 256 possible encryptions. When we have a match, we have located a possibly correct pair of keys. Now, perhaps more than one pair of keys will result in a match, but the number of pairs of keys that return matches should be small. We could try each possible pair of keys. If more than one plaintext/ciphertext correspondence is known (for the key pair), then other correspondences could be used to check which of the keys is correct. So, it only takes twice as long to break double DES using brute force. Because DES has 56-bit security, double DES has 2 × 256 = 257 security. Triple DES – 3DES 3DES was developed in 1999 by IBM – by a team led by Walter Tuchman. 3DES prevents a meet-in-the-middle attack. 3DES has a 168-bit key and enciphers blocks of 64 bits. 3DES effectively has 112-bit security. 3DES can be done with 2 or 3 keys. 3-key encryption ( E k 3 , D ( k 2 , E ( k1 , p ) ) ) 2-key encryption ( E k1 , D ( k 2 , E ( k 1 , p ) ) ) Why would we want to do decryption as the second step? One reason might be that by taking k 2 =k1 ; 2-key, 3DES becomes single DES with key k1 . 3DES can communicate with single DES.