Contemporary Symmetric Ciphers
Contemporary Symmetric Ciphers
Symmetric Ciphers
Triple DES
• A replacement for DES was needed
– theoretical attacks that can break it
– demonstrated exhaustive key search attacks
• AES is a new cipher alternative
• Before AES alternative
– use multiple encryptions with DES
• Triple-DES is the chosen form
Why Triple-DES?
• why not Double-DES?
– NOT same as some other single-DES use,
but have
• meet-in-the-middle attack
– works whenever use a cipher twice
– since X = EK1[P] = DK2[C]
– attack by encrypting P with all keys and store
– then decrypt C with keys and match X value
– can show takes O(256) steps
Triple-DES with Two-Keys
• hence must use 3 encryptions
– would seem to need 3 distinct keys
– Key of 56 X 3 = 168 bits seems too long
• but can use 2 keys with E-D-E sequence
– C = EK1[DK2[EK1[P]]]
– No cryptographic significance to the use of D in the
second step
• standardized in ANSI X9.17 & ISO8732
• no current known practical attacks
– some are now adopting Triple-DES with three keys
for greater security
Triple-DES with Three-Keys
• although are no practical attacks on two-
key Triple-DES have some indications
• can use Triple-DES with Three-Keys to
avoid even these
– C = EK3[DK2[EK1[P]]]
• has been adopted by some Internet
applications
Blowfish
• a symmetric block cipher designed by
Bruce Schneier in 1993/94
• characteristics
– fast implementation on 32-bit CPUs, 18 clock
cycles per byte
– compact in use of memory, less than 5KB
– simple structure for analysis/implementation
– variable security by varying key size
• Allows tuning for speed/security tradeoff
Blowfish Key Schedule