From: “Perry E. Metzger” <perry@piermont.com>
To: mpd@netcom.com (Mike Duvos)
Message Hash: b6c82c6cfe1333ce9fe025eca842020d60de4e55ccd7aab5a255f20d60eecdc5
Message ID: <199605021252.IAA20759@jekyll.piermont.com>
Reply To: <199605012312.QAA11109@netcom14.netcom.com>
UTC Datetime: 1996-05-02 19:26:34 UTC
Raw Date: Fri, 3 May 1996 03:26:34 +0800
From: "Perry E. Metzger" <perry@piermont.com>
Date: Fri, 3 May 1996 03:26:34 +0800
To: mpd@netcom.com (Mike Duvos)
Subject: Re: [Fwd: Cylink can export 128-bit DH?]
In-Reply-To: <199605012312.QAA11109@netcom14.netcom.com>
Message-ID: <199605021252.IAA20759@jekyll.piermont.com>
MIME-Version: 1.0
Content-Type: text/plain
Mike Duvos writes:
> frantz@netcom.com (Bill Frantz) writes:
>
> > Most cryptographic experts recommend Triple DES, encrypting
> > the data 3 times with 3 different keys.
>
> It's actually encrypted three times with two keys comprising
> 112 bits of keyspace, using a decrypt on one key sandwiched
> between two encrypts using the other. This prevents a "man
> in the middle" attack, which would be possible if only two
> DES encryptions were used, one for each key.
Many 3DES implementations actually do use 3 different
keys. Surprisingly, the strength of 3DES with 3 keys is around the
strength you would naively expect 3DES with 2 keys to have, and 3DES
with 2 keys is slightly weaker than you would expect...
.pm
Return to May 1996
Return to “Raph Levien <raph@cs.berkeley.edu>”