DES Attacks and Triple DES - PowerPoint PPT Presentation

About This Presentation
Title:

DES Attacks and Triple DES

Description:

DES Attacks and Triple DES. Cryptography and. Network Security. Reference: Sec 4.1 of Stallings Text ... Write an attack program for simplified triple DES (SDES3.java) ... – PowerPoint PPT presentation

Number of Views:357
Avg rating:3.0/5.0
Slides: 9
Provided by: johnpaul3
Category:
Tags: des | attacks | sec | triple

less

Transcript and Presenter's Notes

Title: DES Attacks and Triple DES


1
DES Attacks and Triple DES
  • Cryptography and
  • Network Security

Reference Sec 4.1 of Stallings Text
2
DES and Brute Force Attack
  • Known plaintext attack
  • Plaintext-ciphertext pairs are available
  • Brute force attack involves going through all 256
    keys, encrypting the plaintext and matching with
    the ciphertext
  • SDESCrack1.java and SDESCrack2.java are programs
    that attack Simplified DES
  • Brute-force search on all 210 keys
  • Note the necessity of two plaintext-ciphertext
    pairs

3
Multiple DES
  • Brute-force attack on DES will eventually become
    possible and practical
  • Multiple applications (multiple keys) of DES
    increases the key search space for brute-force
    attacks
  • e.g., Double DES means two keys and therefore
    2112 possible key-pairs to consider

4
Double DES
  • Encryption C Ek2Ek1P
  • Decryption P Dk1Dk2C
  • Check out SDES2.java for a simplified version
  • The following fact is essential
  • For any two keys k1 and k2, it does not follow
    that a key k3 exists where Ek2Ek1P Ek3P
  • A single-key brute-force attack will not work
  • Brute-force attack has two go through all
    key-pairs (see SDES2Crack1.java
    SDES2Crack2.java)

5
Meet-in-the-Middle Attack
  • C Ek2Ek1P impliesX Ek1P Dk2C
  • Algorithm (assume p1,c1 and p2,c2 are known
    pairs)
  • Try all 256 possibilities for k1 and tabulate all
    Ek1p1
  • Try all 256 possibilities for k2, compute for
    Dk2c1, and compare against the table
  • When values match, check ifc2 Ek2Ek1p2

6
Analysis of Revised Attackon Double DES
  • Takes only twice the amount of time (approx) as
    brute-force on Regular DES
  • Requires a table of size 256
  • See SDES2MM.java for an attack on Simplified
    Double DES

7
Triple DES
  • Meet-in-the-Middle attack does not apply if three
    DES applications are used
  • Using three keys possible but aggregate length of
    keys might be undesirable
  • Use two keys instead
  • Reuse a key for first and third application
  • Make second application a decryption operation
    (for backward compatibility with Regular DES)
  • See SDES3.java

8
Programming Homework 2
  • Write an attack program for simplified triple DES
    (SDES3.java)
  • Use a combination of the brute-force method and
    the meet-in-the-middle method (use a table of
    size 210) to come up with an algorithm that runs
    in roughly the same amount of time as
    DES2Crack1.java
Write a Comment
User Comments (0)
About PowerShow.com