Preview

Contemporary Symmetric Ciphers (Double-Des, Triple-Des & Blowfish)

Satisfactory Essays
Open Document
Open Document
875 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Contemporary Symmetric Ciphers (Double-Des, Triple-Des & Blowfish)
Jordan University of Science and Technology

Computer Engineering Department
Cryptography & Network Security
CPE (541)

HW#5
Contemporary Symmetric Ciphers
(Double-DES, Triple-DES & Blowfish)

Supervised by:
Dr Loái Tawalbeh

Eng. Sulaiman Al-Basheer

Simsam R.Hijjawi
20022171043
Review Problems:

6.1 What is the triple encryption?

It is a three-stages encryption with three different keys, to avoid costly requirements arises from using three different keys with total length of 3x56 = 186 bits a triple encryption with two keys maybe used.

6.2 What is the meet in the middle attack?

It's that attack doesn't depend on any particular property of the DES, instead, it will work against any type of block ciphers.

For the double-DES cipher & a given (P,C) pair, this attack works as follow:

1. Encrypt the plaintext P with all possibilities of K1, store the results in a table, & sort that table by the value of X. 2. Decrypt C with all possible values of K2, check each resulted value with the entries in the table, in case of match, check these two keys against another known pair (P1,C1), if match, accept them as the correct keys.

6.4 Why is the middle portion of 3DES is a decryption rather than an encryption ?

1. It's a decryption process in order to change the traditional nature of the DES, if it's an encryption, it'll stay a DES but with longer key size. 2. In the cryptography, there is no significance of using the decryption in the middle stage, the only advantage of doing so is to allow users of 3DES to decrypt data encrypted by the users of the older single DES
( C = Ek1[Dk2[Ek1[P]]] = Ek1[P]. Suppose that the middle portion is decryption instead of encryption,
( C = Ek1[Ek2[Ek1[P]]] The previous assumption in equation 1 will not be ever met. On the other hand 3. If an encryption process is done instead of decryption the meet-in-the-middle

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Nt1330 Unit 3 Lab Report

    • 1102 Words
    • 5 Pages

    The created S3 bucket stores the encrypted password file. Encryption of the file system happens using such a password or key. When a boot happens for an Amazon EC2 instance, the files are copied, the encrypted password is read, the password is decrypted, and the plaintext password is retrieved. Utilization of this password happens when encrypting the file system on the instance store disk. Through the first step, the creation of an S# bucket occurs to enable the storage of the encrypted password file on it. Application of necessary permissions happens afterward. Additional permissions to the bucket to enable endpoint access are necessary whenever using Amazon VPC endpoint for Amazon S3.…

    • 1102 Words
    • 5 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    7. The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. SHA1 and Triple DES are the same, they both use algorithms.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5) dPECK(GP,pkS,pkRi,skRi,W): Taking GP,pkS,pkRi,skRi and a keyword set w=(w1,.wl) as the data source, the capacity gives back a ciphertext c1 of w for Ri.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Case Analysis

    • 293 Words
    • 2 Pages

    3. You need to write while(x>1){}. - DON'T - Penalties will be assessed for code sharing.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    The two types of encryption supported by GPG are MD5 and Sha1 which serve as hashing encryptions.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    launches, the VDR decrypts the encrypted virus body back to its original form so the…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Week 5 Assignments New

    • 754 Words
    • 6 Pages

    Step 2: Based on the values to the variables in Step 1, do the following conditions result in a true or false statement?…

    • 754 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The fifth stage is message decoded the receiver now has to interpret your message, e.g. what…

    • 1116 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Hipaa

    • 493 Words
    • 2 Pages

    Data encryption technology protects EMR while they are stored and while they are being transferred, ensuring that only the…

    • 493 Words
    • 2 Pages
    Good Essays