Cryptography Reference
In-Depth Information
remove this drawback and concurrently utilize the careful design of DES. You
will find two results of these attempts later in this section and a large number
of additional ones in Schneier [SchnCr, Chapter 13].
5.2.1 Triple-DES
The most obvious means against short keys is multiple encryption with different
keys. For example, using Double-DES encryption, we would choose a 112-bit
key, and split it into two subkeys, K and K , and then encrypt each plaintext
block, P , with K and then once more with K :
C = DES K '(DES K (P))
No brute force is possible against a 112-bit key. This method can be easily
implemented in software, and it is slower than DES only by a factor of 2
(with a security 72 quadrillion times larger). To build a ciphering device, all
we actually need to do is switch two DES chips in series and then feed them
with subkeys separately — no problem at all.
These considerations are pretty obvious, and as usual in cryptology, obvious
views are wrong — here too. Considering this generality, we cannot say that
double encryption is more secure than simple encryption. First of all, it could
well be that there is a (56-bit) key, K , so that the following holds for arbitrary
plaintext blocks, P :
DES K = DES K (DES K (P))
In that case, multiple encryption would not be more secure than simple encryp-
tion to fend off brute force; only dictionary attacks would get harder. Algo-
rithms that always have such K keys are said to have group property or
to form a group . (Actually not a well-chosen name, because, in mathematics,
there is always a single element that belongs to a group. In our case, this would
be the identity. A key where the plaintext transforms onto itself doesn't have
to exist in arbitrary algorithms with group property.)
DES does not form a group. Though an algebraic operation is defined on
the set of mappings defined by multiple encryption as a result of consecutive
 
Search WWH ::




Custom Search