This page (revision-1) was last changed on 29-Nov-2024 16:16 by UnknownAuthor

Only authorized users are allowed to rename pages.

Only authorized users are allowed to delete pages.

Page revision history

Version Date Modified Size Author Changes ... Change note

Page References

Incoming links Outgoing links

Version management

Difference between version and

At line 1 added 22 lines
!!! Overview
[{$pagename}] (or [TDES] or [DES3]) is a variation of the Data Encryption Standard ([DES]) [Symmetric Key] [Cipher] that is three times slower than [DES] but provides stronger reliability.
The [Cipher] uses three 64-bit keys for a combined key length of 192 bits.
The [Message] is encrypted with the first key, decrypted with the second key, and then re-encrypted with the third key.
You [MUST] ensure that all three keys, are unique.
%%warning
[National Institute of Standards and Technology] ([NIST]) has announced withdrawal of approval for [{$pagename}] (also known as [3DES], [TDES] and sometimes DES EDE) in common [protocols] such as [TLS] and [IPsec].
%%
[{$pagename}] [cipher] suffers from a fundamental [weakness|Cryptographically Weak] linked to its small (64-bit) blocksize, i.e. the size of [plaintext] that it can encrypt. In the common mode of operation [CBC], each plaintext block is [Bitwise XOR]ed with the previous [ciphertext] before [encryption]. This means if you encrypt a lot of [data] and by chance you and get the same [ciphertext] block [twice|Cryptographic Collision], an [attacker] can learn the [Bitwise XOR] of the two corresponding blocks of [plaintext] (he obtains this by [Bitwise XOR]ing the two preceding [ciphertexts] together).
How much [plaintext] do you need to [encrypt] before a collision becomes likely? The calculation is closely related to the [Birthday Paradox].
[{$pagename}] suffers from the same [cryptographically Weak] issue as similar to [MD5]
!! More Information
There might be more information for this subject on one of the following:
[{ReferringPagesPlugin before='*' after='\n' }]