Factbites
 Where results make sense
About us   |   Why use us?   |   Reviews   |   PR   |   Contact us  

Topic: 3DES


Related Topics
K2

In the News (Fri 24 May 19)

  
  Triple DES - Wikipedia, the free encyclopedia
In cryptography, Triple DES (also 3DES or DESede) is a block cipher formed from the Data Encryption Standard (DES) cipher.
It was developed by Walter Tuchman (the leader of the DES development team at IBM) in 1978 and is specified in FIPS Pub 46-3.
3DES is better suited to hardware implementations, and indeed where it is still used it tends to be with a hardware implementation (eg VPN appliances), but even there AES outperforms it.
en.wikipedia.org /wiki/3DES   (566 words)

  
 Extracting a 3DES key from an IBM 4758
When a 3DES key is to be changed the central computer will cause a new key to be generated securely within its IBM 4758.
A replicate key part has both halves of the 3DES key identical and it is used for interworking with legacy applications that can only handle DES encryption.
Note that since the key being exported is a single DES key we are allowed to export it with a replicate 3DES key, since they are of equivalent strength.
www.cl.cam.ac.uk /~rnc1/descrack/attack.html   (1469 words)

  
 Wireless glossary - Wireless World - CNET.com
As its name suggests, 3DES is a three-step data encryption algorithm that evolved from DES.
3DES provides greater security than DES because it encrypts, decrypts, and encrypts the data using three keys instead of just one.
The size of a 3DES key is also three times bigger: 168 bits to 56 bits for DES.
www.cnet.com /4520-7364_1-105323-1.html   (570 words)

  
 PGP DH vs. RSA FAQ
DES is formally defined in [FIPS46-2] and Triple-DES (3DES) in [ANSI952].
It is important in multiple encryption schemes that the underlying cipher is not a group; fortunately Campbell & Wiener have shown that DES is not a group [CW93].
Of all the block ciphers in the public literature, 3DES appears to be the closest we have to an "ideal cipher" in terms of strength.
www.scramdisk.clara.net /pgpfaq.html   (15220 words)

  
 3DES Encryption   (Site not responding. Last check: 2007-10-08)
3DES uses three stages of DES so it is much more secure and suffices for most applications currently.
In 3DES, we apply 3 stages of DES with a seperate key for each stage.
Hence 3DES is quite safe for now but NIST has replaced 3DES as the encryption standard.
kingkong.me.berkeley.edu /~kenneth/courses/sims250/des.html   (1443 words)

  
 CAST 3DES Core
The 3DES core is a full hardware implementation of the triple DES algorithm as described in the X9.52 standard, suitable for a variety of applications.
The triple DES algorithm was proposed by IBM when it became clear that the security of the DES had been compromised by advances in computer technology.
It is the customer’s responsibility to check with relevant authorities regarding the re-export of equipment containing the triple 3DES technology.
www.cast-inc.com /cores/3des/index.shtml   (486 words)

  
 3des Software
3des, dpcrypt, rijndael serpent, mars, cast256, blowfish, twofish, paehl
3des, blowfish, misty1, ice2, cast128, gost, cbc mode, crypther dll, mars, cast256, twofish, idea, paehl, rijndael, thin ice
3des, blowfish, misty1, ice2, cast128, gost, cbc mode, dp multicrypt, mars, cast256, twofish, idea, paehl, rijndael, thin ice
www.soft911.com /find/3des.html   (506 words)

  
 The Green Sheet, Inc. · in Print
3DES is a data-encryption standard algorithm that encrypts input data three times (versus only one time) so it raises the level of fraud protection for PIN-based transactions initiated at ATMs.
The 3DES ("Triple-dez") FIX is a 3DES-compliant PIN pad with a companion "router" that forwards the encrypted messages to the modem, Normyle said.
The 3DES FIX is designed for Diebold 1060, 1062, 1064i, 1072, 1073, 1074, including the "i" series, MDS and all STP-based units, NCR 50xx series and 56xx series and the Fujitsu 4000 series and 6000 series ATMs.
www.greensheet.com /PriorIssues-/031002-/17.htm   (1095 words)

  
 Security Forums Dot Com :: View topic - Twofish, Blowfish, or 3DES Analysis and Review
Although 3DES is considered the most secure algorithm, in both the theoretical and practical sense, it is suggested that one deter from using this design in new cryptographic systems.
However, DES still finds practical use, in the form of 3DES, be it for legacy purposes, or based on the fact that DES is the best analyzed algorithm, to date.
In all actual senses, 3DES is still considered a "good" cipher, in terms of analyzed security, and will continued to be used because of this.
www.security-forums.com /forum/viewtopic.php?t=6690   (4125 words)

  
 [No title]
While this provides an easy method for preventing repetition, and is sufficiently robust for practical use, cryptanalysis may use the rare serendipitous occurrence when a corresponding bit position in the first DES block increments in exactly the same fashion.
Care should be taken that the periodicity of the number generator is long enough to prevent repetition during the lifetime of the session key.
Although it is widely believed that 3DES is substantially stronger than DES, as it is less amenable to brute force attack, it should be noted that real cryptanalysis of 3DES might not use brute force methods at all.
www.ietf.org /rfc/rfc1851.txt   (2137 words)

  
 Triple DES Encryption for IPSec
Triple DES (3DES) is a strong form of encryption that allows sensitive information to be transmitted over untrusted networks.
Use this command to specify the encryption algorithm to be used in an IKE policy.
This example configures an IKE policy with the 3DES encryption algorithm (all other parameters are set to the defaults):
www.cisco.com /univercd/cc/td/doc/product/software/ios120/120newft/120t/120t2/3desips.htm   (740 words)

  
 SecuriTeam.com ™ - Nortel CES (3DES version) offers false sense of security when using IPSEC
The 3DES encryption keys are encrypted using single DES during initial key exchange thus reducing cryptographic strength to 56-bit DES level.
Eavesdropper is able to resolve the 3DES encryption keys only by (brute force or otherwise) cracking the IKE phase 1 single DES key.
The warning message for 3DES IKE rejection in CES can be found from Status/Event Log by searching for string "ISAKMP [13] No proposal chosen in message from".
www.securiteam.com /securitynews/5MP060A3QW.html   (950 words)

  
 [No title]   (Site not responding. Last check: 2007-10-08)
Both DES and 3DES encrypt a 64-bit block of plaintext into a 64bit block of ciphertext.
Using 3DES, it is possible to reach a larger portion of those possible mappings.
This is possible because DES operation is not closed i.e 3DES is not transitive.
www.public.asu.edu /~ssshah2/academics/cryptography/hw1.doc   (1658 words)

  
 The Green Sheet, Inc. · in Print
Payment industry suppliers hoping to give their ATMs a security upgrade to Triple DES (3DES) encryption in order to meet conversion schedules from credit card companies should be aware of a new device from Pi Systems International.
3DES is a data-encryption standard algorithm that encrypts input data three times and raises the level of fraud protection for PIN-based transactions initiated at ATMs.
According to Pi Systems, there are three ways to upgrade your equipment to be 3DES compliant: (1) buy completely new equipment, which can cost tens of thousands of dollars, (2) upgrade the processor, keypad and software of the current ATM, which can cost up to $5,000 or (3) install Pi Systems' 3DES FIX.
www.greensheet.com /PriorIssues-/030101-/10.htm   (278 words)

  
 [No title]
This document specifies a mechanism for the encryption of an HMAC key of arbitrary length by a 3DES KEK or an AES KEK.
The 3DES wrapping of HMAC keys is based on the algorithm defined in Section 3 of [3DES-WRAP].
Note: When the same HMAC key is wrapped in different 3DES KEKs, a fresh initialization vector (IV) must be generated for each invocation of the HMAC key wrap algorithm (step 6).
www.ietf.org /rfc/rfc3537.txt   (1604 words)

  
 RFC1851   (Site not responding. Last check: 2007-10-08)
This mode of 3DES requires an Initialization Vector (IV) that is eight octets in length.
RFC 1851 ESP 3DES September 1995 Payload Data The size of this field is variable.
RFC 1851 ESP 3DES September 1995 [OW91] van Oorschot, P.C., and Weiner, M.J. "A Known-Plaintext Attack on Two-Key Triple Encryption", Advances in Cryptology -- Eurocrypt '90 Proceedings, Berlin: Springer-Verlag, 1991, pp.
rfc.net /rfc1851.html   (2050 words)

  
 ATM Security | ATM Marketplace Research
The 3DES Plus processor needed to recognize when a PIN entry screen was being requested so that it could "tell" the EPP when data needed to be encrypted and when it did not.
Here's how the 3DES Plus works: When the processor's proprietary element recognizes that an ATM is instructing a cardholder to enter his PIN, it instructs the EPP to enter secure mode and store the PIN.
Turner said that 3DES Fix's software follows the states sent by the processor, enabling the control module to determine whether its EPP should be in Triple DES mode or clear text mode.
www.atmmarketplace.com /research.htm?article_id=17309&pavilion=4&step=story   (1687 words)

  
 [No title]
Since no 3DES key is available then both the old and new code will issue and accept DES v4 TGTs.
None of the attacks discovered so far can be implemented given a KDC that accepts but does not issue 3DES tickets, so we believe that leaving this functionality in as compatibility for a version or two is reasonable.
Note also that even if issuance of 3DES v4 tickets has been disabled, outstanding tickets may be used to perform the 3DES cut-and-paste attack.
web.mit.edu /kerberos/www/advisories/MITKRB5-SA-2003-004-krb4.txt   (2702 words)

  
 Valery's blog - 3DES key size   (Site not responding. Last check: 2007-10-08)
However, modified meet-in-the-middle (with ridiculous storage requirements) could be used against 3DES with 3 keys that makes some people to argue that strength of 3DES 3 keys is not much better than 3DES 2 keys and lies in area between 112 and 128 bits of security.
However, since we use DES keys for 3DES – they are expected to be given in 64bit structure containing 8 parity bits.
Therefore, many standard cryptographic packages are expecting 3DES keys to be passed in multiple of 64 bits and treat 128 bit block as 3DES with 2 keys and 192 bits as 3DES with 3 keys, while as actually it will be only 112 and 168 bits that are used in key schedule.
www.harper.no /valery/PermaLink,guid,4d2c3efd-02b1-4cea-b4c5-df83fb10e741.aspx   (1428 words)

  
 Transaction Talk - Euronet's Corporate Newsletter
The use of Triple DES (3DES) is a stepping-stone solution for newer encryption technologies such as the Advanced Encryption Standard (AES).
Although potentially complex in its implementation, 3DES at least fits the existing DES infrastructure and is backwards compatible with existing DES.
PSO assistance with general 3DES awareness could be as simple as a few hours in a conference call and e-mail information, or it could be as complex as an onsite visit to discuss 3DES, what it is, how it impacts a financial institution, and what the financial institution needs to think about.
www.euronetworldwide.com /newsletter/2002_q1q2/article2.asp   (691 words)

  
 3des & triple des encryption
Ex-File is a unique and exceptionally useful 3des (triple des) product.
This is the fully comprehensive 3des (triple des) solution.
It offers 3des (triple des) encryption on networks, laptops, stand alone PCs.
www.securitynet.kirion.net /3des   (228 words)

  
 Windows Encrypted File System: Replace DESX algorithm with 3DES   (Site not responding. Last check: 2007-10-08)
When 3DES is enabled, files encrypted by using both the DESX and 3DES algorithms can be decrypted.
However, all new files are encrypted by using the 3DES algorithm.
It is also possible to configure EFS to use 3DES without affecting encryption elsewhere.
hacks.oreilly.com /pub/h/2134   (165 words)

  
 RE: Win2000 IKE and 3des
On the corp-side, some servers will be configured to accept 3DES only and others both DES and 3DES.
If you don't weaken 3DES on the export clients, there is no way to talk to servers with DES configured.
Having said that, the report mechanism should probably be improved and we will address this in the next release.
www.sandelman.ottawa.on.ca /ipsec/2000/05/msg00079.html   (247 words)

  
 ISS X-Force Database: cca-3des-weak-key(7491): IBM Common Cryptographic Architecture (CCA) weak 3DES exporter key
IBM Common Cryptographic Architecture (CCA) version 2.40 and possibly older versions could allow a remote attacker to generate a known 3DES exporter key, caused by a vulnerability in the CCA library.
A remote attacker can generate a 3DES exporter key by using a 3DES replicate key and a single DES data key.
The 3DES replicate key and single DES data key uses only a single DES level of security, which can be determined through a brute force attack.
xforce.iss.net /xforce/xfdb/7491   (323 words)

  
 Free 3des Downloads
You'll be able to store all your logins, passwords, PIN codes, credit card numbers and their access codes, and any other confidential information in one place.
Besides the program provides operating mode with autoclosure of database, what decreases probability of stealing your data (for example, you have been called out by your chief or you simply forgot to quit the program).
The additional special protection completely excludes an opportunity of selection of the password to the encrypted information at use of the generator of the passwords and keys.
www.filesweb.com /3des   (1559 words)

  
 How to setup IPSec for Linux, OpenBSD and PGPNet
OpenBSDs isakmpd is highly configurable, features DES, 3DES, Blowfish and CAST encryption algorithms, different keylifetimes based on time or transfered data.
As FreeS/WAN only supports 3DES, MD5 and SHA the isakmpd.conf was cut down to fit these needs.
To make this work, PGPNet was told to use only 3DES for encryption and SHA or MD5 for authentication.
linuxsecurity.com /resource_files/cryptography/ipsec-howto/HOWTO.html   (740 words)

Try your search on: Qwika (all wikis)

Factbites
  About us   |   Why use us?   |   Reviews   |   Press   |   Contact us  
Copyright © 2005-2007 www.factbites.com Usage implies agreement with terms.