1994-02-28 - DES Question

Header Data

From: Matthew J Ghio <mg5n+@andrew.cmu.edu>
To: Cypherpunks Mailing List <cypherpunks@toad.com>
Message Hash: 0b1c0bd198abdfe9b654422852538211adb9cac6bf6fe76c6d4fb682b53d2074
Message ID: <ghQZ=Nq00awT82I0UR@andrew.cmu.edu>
Reply To: N/A
UTC Datetime: 1994-02-28 20:25:20 UTC
Raw Date: Mon, 28 Feb 94 12:25:20 PST

Raw message

From: Matthew J Ghio <mg5n+@andrew.cmu.edu>
Date: Mon, 28 Feb 94 12:25:20 PST
To: Cypherpunks Mailing List <cypherpunks@toad.com>
Subject: DES Question
Message-ID: <ghQZ=Nq00awT82I0UR@andrew.cmu.edu>
MIME-Version: 1.0
Content-Type: text/plain


When using DES to encrypt email addresses, the total amount of data to
be encrypted would be only 3 or 4 eight-byte DES blocks.  My question
is: Would CBC or CFB really be effective for such a small amount of
data?  Or would it be better to encrypt multiple times with
transpositions in between (ie '4x3' DES as was described earlier in
cypherpunks)?

Second question: The DES code that I have (not written by me) has a
comment section which describes filling all 16 subkeys seperately,
thereby allowing a 128 byte key.  Is there any significant advantage to
doing this?  Is there any reason that I should not do it?

What is the purpose of the initial and final permutations?





Thread