0% found this document useful (0 votes)
102 views14 pages

Double DES & Triple DES: Prepared By: Sharma Hemant

The document discusses different methods of encrypting data using DES (Data Encryption Standard), including double DES, triple DES with 2 keys, and triple DES with 3 keys. Double DES encrypts data twice with two different keys, but is vulnerable to meet-in-the-middle attacks. Triple DES with 2 keys encrypts-decrypts-encrypts with 2 keys, increasing strength over double DES. Triple DES with 3 keys, which uses 3 different keys, is preferred as it has an effective key length of 168 bits and is not vulnerable to meet-in-the-middle attacks.

Uploaded by

durai murugan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
102 views14 pages

Double DES & Triple DES: Prepared By: Sharma Hemant

The document discusses different methods of encrypting data using DES (Data Encryption Standard), including double DES, triple DES with 2 keys, and triple DES with 3 keys. Double DES encrypts data twice with two different keys, but is vulnerable to meet-in-the-middle attacks. Triple DES with 2 keys encrypts-decrypts-encrypts with 2 keys, increasing strength over double DES. Triple DES with 3 keys, which uses 3 different keys, is preferred as it has an effective key length of 168 bits and is not vulnerable to meet-in-the-middle attacks.

Uploaded by

durai murugan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 14

Double DES & Triple DES

Prepared by : Sharma Hemant


hemantbeast@gmail.com
Contents

 DES Overview

 Double DES

 Triple DES with 2-key encryption

 Triple DES with 3-key encryption


DES Overview
DES Overview
Double DES
 In this approach, we use two instances of DES ciphers for encryption and
two instances of reverse ciphers for decryption.

 Each instances use a different key.


• The size of the key is doubled.

 There are issues of reduction to single stage.

 However, double DES is vulnerable to meet-in-the-middle attack.


Double DES
 Given a plaintext P and two encryption keys 𝐾1 and 𝐾2 , a cipher text can
be generated as,
C = E(𝐾2 , E(𝐾1 , P))
 Decryption requires that the keys be applied in reverse order,
P = D(𝐾1 , D(𝐾2 , C))
Meet-in-the-middle attack
Meet-in-the-middle attack
 The middle text, the text created by the first encryption or the first
decryption, M, should be same
M = 𝐸𝐾1 (P) M = 𝐷𝐾2 (C)
 Encrypt P using all possible values of 𝐾1 and records all values obtained
for M.
 Decrypt C using all possible values of 𝐾2 and records all values obtained
for M.
 Create two tables sorted by M values.
 Now compares the values for M until we finds those pairs of 𝐾1 & 𝐾2 for
which the value of M is same in both tables.
Meet-in-the-middle attack

 Instead of using 2112 key search tests, we have to use 256 key search tests
two times.
 Moving from a Single DES to Double DES, we have to increased the
strength from 256 to 257 .
Triple DES with 2-key
 Use three stages of DES for encryption and decryption.
 The 1st, 3rd stage use 𝐾1 key and 2nd stage use 𝐾2 key.
 To make triple DES compatible with single DES, the middle stage uses
decryption in the encryption side and encryption in the decryption side.
 It’s much stronger than double DES.
Triple DES with 2-key
 The function follows an encrypt-decrypt-encrypt (EDE) sequence.
C = E(𝐾1 , D(𝐾2 , E(𝐾1 , P)))
P = D(𝐾1 , E(𝐾2 , D(𝐾1 , C)))

 By the use of triple DES with 2-key encryption, it raises the cost of meet-
in-the-middle attack to 2112 .
 It has the drawback of requiring a key length of 56 × 3 = 168bits which
may be somewhat unwieldy.
Triple DES with 3-key
 Although the attacks just described appear impractical, anyone using two-
key 3DES may feel some concern.
 Thus, many researches now feel that 3-key 3DES is the preferred
alternative.
 Use three stages of DES for encryption and decryption with three different
keys.
 3-key 3DES has an effective key length of 168 bits and is defined as,
C = E(𝐾3 , D(𝐾2 , E(𝐾1 , P)))
P = D(𝐾1 , E(𝐾2 , D(𝐾3 , C)))
Triple DES with 3-key

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy