Preview

Contemporary Symmetric Ciphers (Double-Des, Triple-Des & Blowfish)

Satisfactory Essays
Open Document
Open Document
875 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Contemporary Symmetric Ciphers (Double-Des, Triple-Des & Blowfish)
Jordan University of Science and Technology

Computer Engineering Department
Cryptography & Network Security
CPE (541)

HW#5
Contemporary Symmetric Ciphers
(Double-DES, Triple-DES & Blowfish)

Supervised by:
Dr Loái Tawalbeh

Eng. Sulaiman Al-Basheer

Simsam R.Hijjawi
20022171043
Review Problems:

6.1 What is the triple encryption?

It is a three-stages encryption with three different keys, to avoid costly requirements arises from using three different keys with total length of 3x56 = 186 bits a triple encryption with two keys maybe used.

6.2 What is the meet in the middle attack?

It's that attack doesn't depend on any particular property of the DES, instead, it will work against any type of block ciphers.

For the double-DES cipher & a given (P,C) pair, this attack works as follow:

1. Encrypt the plaintext P with all possibilities of K1, store the results in a table, & sort that table by the value of X. 2. Decrypt C with all possible values of K2, check each resulted value with the entries in the table, in case of match, check these two keys against another known pair (P1,C1), if match, accept them as the correct keys.

6.4 Why is the middle portion of 3DES is a decryption rather than an encryption ?

1. It's a decryption process in order to change the traditional nature of the DES, if it's an encryption, it'll stay a DES but with longer key size. 2. In the cryptography, there is no significance of using the decryption in the middle stage, the only advantage of doing so is to allow users of 3DES to decrypt data encrypted by the users of the older single DES
( C = Ek1[Dk2[Ek1[P]]] = Ek1[P]. Suppose that the middle portion is decryption instead of encryption,
( C = Ek1[Ek2[Ek1[P]]] The previous assumption in equation 1 will not be ever met. On the other hand 3. If an encryption process is done instead of decryption the meet-in-the-middle

You May Also Find These Documents Helpful

  • Powerful Essays

    Nt1310 Unit 7 Exercise 1

    • 641 Words
    • 3 Pages

    Despite slowly being phased out, Triple DES still manages to make a dependable hardware encryption solution for financial services and other industries.…

    • 641 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Unit 9 Lab 1

    • 334 Words
    • 2 Pages

    7. The Secure Hash Algorithm 1 (SHA-1) is a well-known and currently secure cryptographic hash function designed by the NSA. SHA1 and Triple DES are the same, they both use algorithms.…

    • 334 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    5) dPECK(GP,pkS,pkRi,skRi,W): Taking GP,pkS,pkRi,skRi and a keyword set w=(w1,.wl) as the data source, the capacity gives back a ciphertext c1 of w for Ri.…

    • 259 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    lab 8 Access Controls

    • 943 Words
    • 4 Pages

    2. What do you need to do if you want to decrypt encrypted message and files from a trusted sender?…

    • 943 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Data is stored in a distributed way, Data partitioned in this scheme is already implicitly secured and each packet is stored distributed in different servers, log structure is maintained to keep track of each data block. Reconstruction of the data packet makes use of the log files.…

    • 470 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Nt1310 Unit 7 Answers

    • 1433 Words
    • 6 Pages

    Encryption is the process of transforming normal content, called plaintext, into unreadable gibberish, called ciphertext.…

    • 1433 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    Lab #3

    • 517 Words
    • 3 Pages

    The two types of encryption supported by GPG are MD5 and Sha1 which serve as hashing encryptions.…

    • 517 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Lab 2

    • 639 Words
    • 2 Pages

    launches, the VDR decrypts the encrypted virus body back to its original form so the…

    • 639 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Week 5 Assignments New

    • 754 Words
    • 6 Pages

    Step 2: Based on the values to the variables in Step 1, do the following conditions result in a true or false statement?…

    • 754 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Case Analysis

    • 293 Words
    • 2 Pages

    3. You need to write while(x>1){}. - DON'T - Penalties will be assessed for code sharing.…

    • 293 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 8 Assignment

    • 594 Words
    • 3 Pages

    e. ___Encryption______ is the use of an algorithm to scramble data into a format that can be read only by reversing the algorithm.…

    • 594 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    09 Project Conclusion

    • 285 Words
    • 1 Page

    The encryption system translates the biometric data file into a code using a mathematical tool called a hash function. This is an algorithm that generates a small but unique set of numbers from a larger data file. Although encryption may be confusing for most people, it is a very effective way to protect someone’s biometric data. Encryption adds an additional measure of security to the system so that certain viruses and malware cannot penetrate it. It also makes one’s personal data twice as hard for cyber criminals to hack into. Without encryption, biometric data would be more likely to be accessed and compromised. Using encryption makes biometric data more difficult to penetrate, ensuring that the information therefore, is safe, protected and the user’s privacy is still intact.…

    • 285 Words
    • 1 Page
    Satisfactory Essays
  • Better Essays

    The fifth stage is message decoded the receiver now has to interpret your message, e.g. what…

    • 1116 Words
    • 5 Pages
    Better Essays
  • Good Essays

    Hipaa

    • 493 Words
    • 2 Pages

    Data encryption technology protects EMR while they are stored and while they are being transferred, ensuring that only the…

    • 493 Words
    • 2 Pages
    Good Essays