CNS C
CNS C
112-bit key
Double DES has a
p E(K1,P)> E(K2,E(K1,p)) = C
K2 in this algorithm. Jt.
Double DES uses two keys to say Ki and kirst perfoms 1sing all
using 236
all 2
possible keys and store the results. The stored
to get the encrypted text in cru Encrypt p results will
DES on the original plain text using Ki nclude all possib encryptions p> E(K1,p).
Phy
the encrypted text but this time with th
Here, it again performs
DES on
other ke Then decrypt
C using all possible keys.
K in this algorithm. pK2,C) DK2,E({K2,EK1,p)) ECK1,p) ->
1. What is meant by meet in - the middle attack in double DES ? Explain the same in brief.
K2
K1
GTU Winter-17, Marks 4
Fig. 3.1.1
double DES?
2. How meet in the
middle attnck is performed on
GTU: Summer-19, Marks 4
Using two encryption stages
and two keys. 3. What is a meet-in-the-middle attack in double DES? GTU: Winter-19, Marks 4
is follows,
A) The plain text to iphertext
as
used properly.
DES Encryption
Key 2
encty
ina blocks of text
authentication, CFB is used formanner, CBC is used for
data
authentication, OFB is used for transmitting encrypted
4ata. CTR is used for transmitting block-oriented transmitting encrypted stream of
DES Encryption
- Key 3
o s of operation enable the
applications.
repeated and secure use of block a
single A block cipher by itselt allows cipher under a
Ciphertext of the cipher's block length. encryption only of a single data block
method
Fig. 3.2.1 3DES with three key
When targeting a variable-1ength message, the data must
is the same as the cenarate cipher blocks. Typically, the last block must also
first be partitioned into
.The procedure for decrypting something procedure for be extended to match
encryption, except it is
executed in reverse. cipher's block length using suitable padding scheme.
the a
procedure is essentially the same as standard DES. This sihuation is to be avoided principle.
because it is the same as using a really slow version of regular DES.
3.3.1 Electronic Code Book (ECB)
The input key for DES is 64-bits long; the actual key used by DES is only 56-bis
A block of plaintext encrypts into block of Block size is 64-bits. Each
in length. The least significant (right-most) bit in each byte is a parity
bit, and a
Ciphertext.
should be set so that there are always an odd number of 1s in every byte. These block is encrypted independently.
bits are ignored, so only the seven most
parity bits of each byte ar
significant Plaintext patterns are not concealed since identical blocks of plaintext give
used, resulting in a key length of 56-bits. This means that the effective key identical blocks of ciphertext. It is not necessary to encrypt the file linearly.
strength for Triple DES is actually 168-bits because each of the three keys contais
8 parity bits that are not used
during the encryption process.
User
naly
can
encrypt the 10 blocks in the middle first, then the blocks
the blocks in the beginning. Because of this, encrypted files are accessed
at the end, and
Time1 PN block
of using the same key and the result of the
decryption will urill be XOR with the first block of
ciphertext and form the
second
K
Encrypt block of
plain text. same
procedure is used for all the
blocks.
Enct En The plaintext
is XORed with the
previous ciphertext block before it is
mode is iterative mode.
encrypted.
Encryption . The CBC
CN block is
After a plaintext encrypted, the
resulting ciphertext is also stored in a
feedback register.
CN next plaintext block is encrypted, it is XORed
ho
Before with feedback
the next input to the encrypting routine. register to
become
K
Decrypt Decrypt Decrypt ,Theencryption of each block depends on all the previous blocks.
I t is also easy to modify a ciphertext message by adding, removing or switching Fig. 3.3.2 shows cipher block chaining mode.
encrypted blocks. P1 P2 Co - C2
Synchronization error is unrecoverable.
result will be XOR with the IV and form used for encryption. n The CEworking messages,
the first block of
second
Deginning of the
message in plaintext.
plain text ** blain text.
1.
Simplicity
random
and has a
Decryption is parallelizable Disadvantages
University Q u e s t i o n s
3.3.5 Counter Mode
the inn.
in counter mode use sequence
numbers as
nput to the Discuss selectronic code book and cipher feedback mode with neat
Block ciphers diagrams.
algorithm.
be encrypted
with the same key, provided
that
GTU Summer-17, Marks 7
More than one message can a
2 Dis the following block Cipher modes of operation in detail with neat
sketches:
is used. nmode
different initialise vector -Cipher block chaining
manipulate, any change
in ciphertext directly aff - Counter mode
Plaintext is very easy
to the GTU: Winter-17, Marks 7
3.3.5 shows counter mode. mode of DES operation.
plaintext. Fig. Counter 1 3 Explain cipher feedback
Counter GTU: Summer-18, Marks 4
4. Explain counter mode of DES operation. GTUSummer-18, Marks 4
Encrypt EExplain working of ECB. Why ECB (electronic code book) is
rarely used to encrypt message i
Key Encypt Key
GTU: Summer-19, Marks 4
&Whu CFB (cipher feedback nmode) encrypted messages are less subject to tampering than OFB
2 (output feedback mode) ? GTU Summer-19, Marks 3
7. Explain CFB algorithm mode with diagram.
GTU: Winter-19, Marks 3
8. Explain Counter (CTR) algorithm mode with diugram.
GTU: Winter-19, Marks 3
(a) Encryption
3.4 Short Questions and Answers
Counter Counter 1
Q.1 What is triple encryption ?
Ans. The function follows an encrypt decrypt encrypt (EDE) sequence. There is
Key Encrypt Key- Encrypt to the use of
no
cryptographic significance decryption for the second stage.
Q.2 How many keys are used in triple encryption ?
C2 Ans,:
Tuchman proposed a triple encryption method that uses only two keys.
Q.3 Why is the middle portion of 3DES a decryption rather than an encryption ?
P2 AnS. Decryption requires that the keys be applied in reverse order: P=Dkl|[Ekl[P]|.
(b) Decryption This results in a dramatic
increase in cryptographic strengtn.
Fig. 3.3.5 Counter mode
34 Why ECB mode is not secure for lengthy message
Synchronization error is unrecoverable. Ans.
A
ciphertext error affects only the corresponding bit of For lengthy messages, the ECB mode may not be secure because the messageis
plaintext. Striuctured, it may be possible for a cryptanalyst to exploit these regularities.
Encryption: The counter is encrypted and then XORed with the
produce the ciphertext block. plaintext D k to
3.5 Multiple Choice Questions
Q.1
Advantages which is the largest disadvantage of the symmetric encryption
1. Simple to
implement. More complex and therefore more time-consuming calculatonis
2. It Problem of the secure transmission of the Secret Key.
provides confidentiality.
3. Random CLess secure encryption function.
access of block is possible. dIsn't used
Efficiency is same as block any more.
cipher.
TECHNICAL PUBLICATIONS An up thrust for ECHNICAL PUBLICATIONS-An up thrust for knowledge
knowledge