SlideShare a Scribd company logo
1 of 10
Multiple Encryption & DES
• clear a replacement for DES was needed
– theoretical attacks that can break it
– demonstrated exhaustive key search attacks
• AES is a new cipher alternative
• prior to this alternative was to use multiple
encryption with DES implementations
• Triple-DES is the chosen form
Double-DES?
• could use 2 DES encrypts on each block
– C = EK2(EK1(P))
• issue of reduction to single stage
• and have “meet-in-the-middle” attack
– works whenever use a cipher twice
– since X = EK1(P) = DK2(C)
– attack by encrypting P with all keys and store
– then decrypt C with keys and match X value
– can show takes O(256) steps
Meet In the Middle Attack
• For the double-DES cipher & a given (P,C) pair, this attack works as
follow:
• Encrypt the plaintext P with all possibilities of Ka, store the results in
a table, & sort that table by the value of 2length(ka).
• Decrypt C with all possible values of Kb, check each resulted value
with the entries in the table, in case of match, check these two keys
against another known pair (P1,C1), if match, accept them as the
correct keys.
Triple-DES with Two-Keys
• hence must use 3 encryptions
– would seem to need 3 distinct keys
• but can use 2 keys with E-D-E sequence
– C = EK1(DK2(EK1(P)))
– nb encrypt & decrypt equivalent in security
– if K1=K2 then can work with single DES
• standardized in ANSI X9.17 & ISO8732
• no current known practical attacks
– several proposed impractical attacks might
become basis of future attacks
Triple-DES with Three-Keys
• although are no practical attacks on two-key
Triple-DES have some indications
• can use Triple-DES with Three-Keys to avoid
even these
– C = EK3(DK2(EK1(P)))
• has been adopted by some Internet
applications, eg PGP, S/MIME
Modes of Operation
• block ciphers encrypt fixed size blocks
– eg. DES encrypts 64-bit blocks with 56-bit key
• need some way to en/decrypt arbitrary
amounts of data in practise
• NIST SP 800-38A defines 5 modes
• have block and stream modes
• to cover a wide variety of applications
• can be used with any block cipher
Electronic Codebook Book (ECB)
• message is broken into independent blocks
which are encrypted
• each block is a value which is substituted, like
a codebook, hence name
• each block is encoded independently of the
other blocks
Ci = EK(Pi)
• uses: secure transmission of single values
Electronic
Codebook
Book (ECB)
Advantages and Limitations of ECB
message repetitions may show in ciphertext
if aligned with message block
particularly with data such graphics
or with messages that change very little, which
become a code-book analysis problem
weakness is due to the encrypted message
blocks being independent
main use is sending a few blocks of data
Cipher Block Chaining (CBC)
• message is broken into blocks
• linked together in encryption operation
• each previous cipher blocks is chained with
current plaintext block, hence name
• use Initial Vector (IV) to start process
Ci = EK(Pi XOR Ci-1)
C-1 = IV
• uses: bulk data encryption, authentication

More Related Content

Similar to 41.ppt

Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 

Similar to 41.ppt (20)

Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES) Triple Data Encryption Standard (t-DES)
Triple Data Encryption Standard (t-DES)
 
Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...Information and data security block cipher and the data encryption standard (...
Information and data security block cipher and the data encryption standard (...
 
4. Block Ciphers
4. Block Ciphers 4. Block Ciphers
4. Block Ciphers
 
Information and network security 27 triple des
Information and network security 27 triple desInformation and network security 27 triple des
Information and network security 27 triple des
 
section-8.ppt
section-8.pptsection-8.ppt
section-8.ppt
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
Overview on Cryptography and Network Security
Overview on Cryptography and Network SecurityOverview on Cryptography and Network Security
Overview on Cryptography and Network Security
 
02 Information System Security
02  Information System Security02  Information System Security
02 Information System Security
 
Network Security Lec4
Network Security Lec4Network Security Lec4
Network Security Lec4
 
Information and data security block cipher operation
Information and data security block cipher operationInformation and data security block cipher operation
Information and data security block cipher operation
 
CNIT 141: 4. Block Ciphers
CNIT 141: 4. Block CiphersCNIT 141: 4. Block Ciphers
CNIT 141: 4. Block Ciphers
 
doc5.pdf
doc5.pdfdoc5.pdf
doc5.pdf
 
sheet5.pdf
sheet5.pdfsheet5.pdf
sheet5.pdf
 
paper5.pdf
paper5.pdfpaper5.pdf
paper5.pdf
 
doc5.pdf
doc5.pdfdoc5.pdf
doc5.pdf
 
lecture4.pdf
lecture4.pdflecture4.pdf
lecture4.pdf
 
lecture4.pdf
lecture4.pdflecture4.pdf
lecture4.pdf
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
Class 17
Class 17Class 17
Class 17
 
Cryptography and network security
Cryptography and network securityCryptography and network security
Cryptography and network security
 

More from TapodhirAcharjee2 (7)

Wireless-4.pptx
Wireless-4.pptxWireless-4.pptx
Wireless-4.pptx
 
32.pptx
32.pptx32.pptx
32.pptx
 
23.ppt
23.ppt23.ppt
23.ppt
 
new 2.ppt
new 2.pptnew 2.ppt
new 2.ppt
 
MANET.ppt
MANET.pptMANET.ppt
MANET.ppt
 
2.ppt
2.ppt2.ppt
2.ppt
 
3.pptx
3.pptx3.pptx
3.pptx
 

Recently uploaded

1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
QucHHunhnh
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
SanaAli374401
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
Accessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impactAccessible design: Minimum effort, maximum impact
Accessible design: Minimum effort, maximum impact
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptxBasic Civil Engineering first year Notes- Chapter 4 Building.pptx
Basic Civil Engineering first year Notes- Chapter 4 Building.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 

41.ppt

  • 1. Multiple Encryption & DES • clear a replacement for DES was needed – theoretical attacks that can break it – demonstrated exhaustive key search attacks • AES is a new cipher alternative • prior to this alternative was to use multiple encryption with DES implementations • Triple-DES is the chosen form
  • 2. Double-DES? • could use 2 DES encrypts on each block – C = EK2(EK1(P)) • issue of reduction to single stage • and have “meet-in-the-middle” attack – works whenever use a cipher twice – since X = EK1(P) = DK2(C) – attack by encrypting P with all keys and store – then decrypt C with keys and match X value – can show takes O(256) steps
  • 3. Meet In the Middle Attack • For the double-DES cipher & a given (P,C) pair, this attack works as follow: • Encrypt the plaintext P with all possibilities of Ka, store the results in a table, & sort that table by the value of 2length(ka). • Decrypt C with all possible values of Kb, check each resulted value with the entries in the table, in case of match, check these two keys against another known pair (P1,C1), if match, accept them as the correct keys.
  • 4. Triple-DES with Two-Keys • hence must use 3 encryptions – would seem to need 3 distinct keys • but can use 2 keys with E-D-E sequence – C = EK1(DK2(EK1(P))) – nb encrypt & decrypt equivalent in security – if K1=K2 then can work with single DES • standardized in ANSI X9.17 & ISO8732 • no current known practical attacks – several proposed impractical attacks might become basis of future attacks
  • 5. Triple-DES with Three-Keys • although are no practical attacks on two-key Triple-DES have some indications • can use Triple-DES with Three-Keys to avoid even these – C = EK3(DK2(EK1(P))) • has been adopted by some Internet applications, eg PGP, S/MIME
  • 6. Modes of Operation • block ciphers encrypt fixed size blocks – eg. DES encrypts 64-bit blocks with 56-bit key • need some way to en/decrypt arbitrary amounts of data in practise • NIST SP 800-38A defines 5 modes • have block and stream modes • to cover a wide variety of applications • can be used with any block cipher
  • 7. Electronic Codebook Book (ECB) • message is broken into independent blocks which are encrypted • each block is a value which is substituted, like a codebook, hence name • each block is encoded independently of the other blocks Ci = EK(Pi) • uses: secure transmission of single values
  • 9. Advantages and Limitations of ECB message repetitions may show in ciphertext if aligned with message block particularly with data such graphics or with messages that change very little, which become a code-book analysis problem weakness is due to the encrypted message blocks being independent main use is sending a few blocks of data
  • 10. Cipher Block Chaining (CBC) • message is broken into blocks • linked together in encryption operation • each previous cipher blocks is chained with current plaintext block, hence name • use Initial Vector (IV) to start process Ci = EK(Pi XOR Ci-1) C-1 = IV • uses: bulk data encryption, authentication