SlideShare a Scribd company logo
1 of 14
Download to read offline
Double DES & Triple DES
Prepared by : Sharma Hemant
hemantbeast@gmail.com
Contents
 DES Overview
 Double DES
 Triple DES with 2-key encryption
 Triple DES with 3-key encryption
DES Overview
DES Overview
Double DES
 In this approach, we use two instances of DES ciphers for encryption and
two instances of reverse ciphers for decryption.
 Each instances use a different key.
• The size of the key is doubled.
 There are issues of reduction to single stage.
 However, double DES is vulnerable to meet-in-the-middle attack.
Double DES
 Given a plaintext P and two encryption keys 𝐾1 and 𝐾2, a cipher text can
be generated as,
C = E(𝐾2, E(𝐾1, P))
 Decryption requires that the keys be applied in reverse order,
P = D(𝐾1, D(𝐾2, C))
Meet-in-the-middle attack
 The middle text, the text created by the first encryption or the first
decryption, M, should be same
M = 𝐸𝐾1(P) M = 𝐷𝐾2(C)
 Encrypt P using all possible values of 𝐾1 and records all values obtained
for M.
 Decrypt C using all possible values of 𝐾2 and records all values obtained
for M.
 Create two tables sorted by M values.
 Now compares the values for M until we finds those pairs of 𝐾1 & 𝐾2 for
which the value of M is same in both tables.
Meet-in-the-middle attack
 Instead of using 2112
key search tests, we have to use 256
key search tests
two times.
 Moving from a Single DES to Double DES, we have to increased the
strength from 256 to 257.
Meet-in-the-middle attack
Triple DES with 2-key
 Use three stages of DES for encryption and decryption.
 The 1st, 3rd stage use 𝐾1 key and 2nd stage use 𝐾2 key.
 To make triple DES compatible with single DES, the middle stage uses
decryption in the encryption side and encryption in the decryption side.
 It’s much stronger than double DES.
 The function follows an encrypt-decrypt-encrypt (EDE) sequence.
C = E(𝐾1, D(𝐾2, E(𝐾1, P)))
P = D(𝐾1, E(𝐾2, D(𝐾1, C)))
 By the use of triple DES with 2-key encryption, it raises the cost of meet-
in-the-middle attack to 2112.
 It has the drawback of requiring a key length of 56 × 3 = 168bits which
may be somewhat unwieldy.
Triple DES with 2-key
 Although the attacks just described appear impractical, anyone using two-
key 3DES may feel some concern.
 Thus, many researches now feel that 3-key 3DES is the preferred
alternative.
 Use three stages of DES for encryption and decryption with three different
keys.
 3-key 3DES has an effective key length of 168 bits and is defined as,
C = E(𝐾3, D(𝐾2, E(𝐾1, P)))
P = D(𝐾1, E(𝐾2, D(𝐾3, C)))
Triple DES with 3-key
Triple DES with 3-key
double_des___triple_des in network security_1.pdf

More Related Content

Similar to double_des___triple_des in network security_1.pdf

Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
Mohd Arif
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
Nithin Cv
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
chatsiri
 

Similar to double_des___triple_des in network security_1.pdf (20)

Rsa
RsaRsa
Rsa
 
CNS_Team_5.pptx
CNS_Team_5.pptxCNS_Team_5.pptx
CNS_Team_5.pptx
 
Mifare Desfire Technology
Mifare Desfire TechnologyMifare Desfire Technology
Mifare Desfire Technology
 
Data security in data communication
Data security in data communicationData security in data communication
Data security in data communication
 
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
DARE Algorithm: A New Security Protocol by Integration of Different Cryptogra...
 
secure file storage on cloud using hybrid Cryptography ppt.pptx
secure file storage on cloud using hybrid Cryptography  ppt.pptxsecure file storage on cloud using hybrid Cryptography  ppt.pptx
secure file storage on cloud using hybrid Cryptography ppt.pptx
 
secure file Storage on cloud ppt
secure file Storage on cloud pptsecure file Storage on cloud ppt
secure file Storage on cloud ppt
 
Unit --3.ppt
Unit --3.pptUnit --3.ppt
Unit --3.ppt
 
Rsa
RsaRsa
Rsa
 
Ch09
Ch09Ch09
Ch09
 
Data encryption standard
Data encryption standardData encryption standard
Data encryption standard
 
Network security
Network securityNetwork security
Network security
 
ch09_rsa_nemo.ppt
ch09_rsa_nemo.pptch09_rsa_nemo.ppt
ch09_rsa_nemo.ppt
 
RSA Algorithm.ppt
RSA Algorithm.pptRSA Algorithm.ppt
RSA Algorithm.ppt
 
F010243136
F010243136F010243136
F010243136
 
Cryptography and applications
Cryptography and applicationsCryptography and applications
Cryptography and applications
 
Hv3114921496
Hv3114921496Hv3114921496
Hv3114921496
 
Presentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_PaperPresentation on Cryptography_Based on IEEE_Paper
Presentation on Cryptography_Based on IEEE_Paper
 
Design and Simulation Triple-DES
Design and Simulation Triple-DESDesign and Simulation Triple-DES
Design and Simulation Triple-DES
 
Introduction to security_and_crypto
Introduction to security_and_cryptoIntroduction to security_and_crypto
Introduction to security_and_crypto
 

Recently uploaded

Recently uploaded (20)

WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & InnovationWSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
WSO2CON 2024 - OSU & WSO2: A Decade Journey in Integration & Innovation
 
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
%in Stilfontein+277-882-255-28 abortion pills for sale in Stilfontein
 
Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2Driving Innovation: Scania's API Revolution with WSO2
Driving Innovation: Scania's API Revolution with WSO2
 
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
WSO2CON 2024 - Unlocking the Identity: Embracing CIAM 2.0 for a Competitive A...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
WSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - KanchanaWSO2Con2024 - Hello Choreo Presentation - Kanchana
WSO2Con2024 - Hello Choreo Presentation - Kanchana
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
WSO2CON 2024 - Building the API First Enterprise – Running an API Program, fr...
 
WSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - KeynoteWSO2Con204 - Hard Rock Presentation - Keynote
WSO2Con204 - Hard Rock Presentation - Keynote
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
WSO2CON 2024 - Lessons from the Field: Legacy Platforms – It's Time to Let Go...
 
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and ApplicationsWSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
WSO2CON 2024 - Architecting AI in the Enterprise: APIs and Applications
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdfAzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
AzureNativeQumulo_HPC_Cloud_Native_Benchmarks.pdf
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open SourceWSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
WSO2CON 2024 - Freedom First—Unleashing Developer Potential with Open Source
 
WSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaSWSO2CON 2024 Slides - Open Source to SaaS
WSO2CON 2024 Slides - Open Source to SaaS
 
What Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the SituationWhat Goes Wrong with Language Definitions and How to Improve the Situation
What Goes Wrong with Language Definitions and How to Improve the Situation
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
WSO2CON 2024 - API Management Usage at La Poste and Its Impact on Business an...
 

double_des___triple_des in network security_1.pdf

  • 1. Double DES & Triple DES Prepared by : Sharma Hemant hemantbeast@gmail.com
  • 2. Contents  DES Overview  Double DES  Triple DES with 2-key encryption  Triple DES with 3-key encryption
  • 5. Double DES  In this approach, we use two instances of DES ciphers for encryption and two instances of reverse ciphers for decryption.  Each instances use a different key. • The size of the key is doubled.  There are issues of reduction to single stage.  However, double DES is vulnerable to meet-in-the-middle attack.
  • 6. Double DES  Given a plaintext P and two encryption keys 𝐾1 and 𝐾2, a cipher text can be generated as, C = E(𝐾2, E(𝐾1, P))  Decryption requires that the keys be applied in reverse order, P = D(𝐾1, D(𝐾2, C))
  • 8.  The middle text, the text created by the first encryption or the first decryption, M, should be same M = 𝐸𝐾1(P) M = 𝐷𝐾2(C)  Encrypt P using all possible values of 𝐾1 and records all values obtained for M.  Decrypt C using all possible values of 𝐾2 and records all values obtained for M.  Create two tables sorted by M values.  Now compares the values for M until we finds those pairs of 𝐾1 & 𝐾2 for which the value of M is same in both tables. Meet-in-the-middle attack
  • 9.  Instead of using 2112 key search tests, we have to use 256 key search tests two times.  Moving from a Single DES to Double DES, we have to increased the strength from 256 to 257. Meet-in-the-middle attack
  • 10. Triple DES with 2-key  Use three stages of DES for encryption and decryption.  The 1st, 3rd stage use 𝐾1 key and 2nd stage use 𝐾2 key.  To make triple DES compatible with single DES, the middle stage uses decryption in the encryption side and encryption in the decryption side.  It’s much stronger than double DES.
  • 11.  The function follows an encrypt-decrypt-encrypt (EDE) sequence. C = E(𝐾1, D(𝐾2, E(𝐾1, P))) P = D(𝐾1, E(𝐾2, D(𝐾1, C)))  By the use of triple DES with 2-key encryption, it raises the cost of meet- in-the-middle attack to 2112.  It has the drawback of requiring a key length of 56 × 3 = 168bits which may be somewhat unwieldy. Triple DES with 2-key
  • 12.  Although the attacks just described appear impractical, anyone using two- key 3DES may feel some concern.  Thus, many researches now feel that 3-key 3DES is the preferred alternative.  Use three stages of DES for encryption and decryption with three different keys.  3-key 3DES has an effective key length of 168 bits and is defined as, C = E(𝐾3, D(𝐾2, E(𝐾1, P))) P = D(𝐾1, E(𝐾2, D(𝐾3, C))) Triple DES with 3-key