Академический Документы
Профессиональный Документы
Культура Документы
Cryptography
Double-DES
Meet-in-the-Middle Attack
P Alice
Enc Alice
Enc C
K1 K2
Meet in the Middle Attack
P Alice
Enc X Alice
Enc C
K1 K2
Meet in the Middle Attack
P’ Alice
Enc X Alice
Enc C’
K1 K2
Meet in the Middle Attack
P’ Alice
Enc X Alice
Enc C’
K1 K2
Compute and store
256 P’àX mappings
using different K1’s
Meet in the Middle Attack
P’ Alice
Enc X Alice
Enc C’
K1 K2
Compute and store
256 P’àX mappings Compute 256 C’àX
using different K1’s decryptions using K2’s
Meet in the Middle Attack
P’ Alice
Enc X Alice
Enc C’
K1 K2
Compute and store
256 P’àX mappings Compute 256 C’àX
using different K1’s decryptions using K2’s
Compare X’s from two directions;
If the same, try with different
known plaintexts (P’’,C’’)
Meet in the Middle Attack
Key option 3: K3 = K2 = K1
Equivalent to single-DES (ill-advised)
Triple-DES Keys
Key option 3: K3 = K2 = K1
Equivalent to single-DES (ill-advised)
Triple-DES Keys