Solved

TripleDES

Posted on 2004-03-31
10
397 Views
Last Modified: 2006-11-17
I wish to know in detail about TripleDES algorithm also i wish to know the website which describes the same
0
Comment
Question by:sushajoy
  • 3
  • 2
  • 2
  • +1
10 Comments
 
LVL 9

Expert Comment

by:mmuruganandam
ID: 10722904
0
 
LVL 30

Accepted Solution

by:
Mayank S earned 20 total points
ID: 10722961
0
 
LVL 13

Expert Comment

by:Webstorm
ID: 10723076
See this web site, it also give some other useful links:
http://kingkong.me.berkeley.edu/~kenneth/courses/sims250/des.html

0
 
LVL 5

Expert Comment

by:twobitadder
ID: 10726406
   Web    Images    Groups    News    FroogleNew!    more »
 
GOOGLE

    Advanced Search
  Preferences    
 
 Web  Results 1 - 10 of about 382,000 for 3des [definition]. (0.43 seconds)  
 

3DES Encryption
3DES and Encryption. Kenneth Castelino. Link to the presentation. ... It is hoped that
AES will remain strong enough for the next 10-20 years. 1.2 Overview of 3DES. ...
kingkong.me.berkeley.edu/~kenneth/ courses/sims250/des.html - 17k - Cached - Similar pages

Extracting a 3DES key from an IBM 4758
Extracting a 3DES key from an IBM 4758. Summary. The IBM 4758 is an extremely
secure cryptographic co-processor. ... What is an FPGA ? What are DES and 3DES ? ...
www.cl.cam.ac.uk/~rnc1/descrack/ - 10k - Cached - Similar pages

Triple DES - Wikipedia
Triple DES. (Redirected from 3DES). In cryptography, Triple DES (also 3DES)
is a block cipher formed from the Data Encryption Standard (DES) cipher. ...
en.wikipedia.org/wiki/3DES - 10k - Cached - Similar pages

Triple DES Validation List
... The FipsCrypto on Pocket PC is a FIPS 140-2 compliant software-based cryptographic
module that implements the 3DES, AES, SHA-1 and HMAC-SHA-1 algorithms.". ...
csrc.nist.gov/cryptval/des/tripledesval.html - 101k - 30 Mar 2004 - Cached - Similar pages

Wilde's WWW Online Glossary: 3DES
3. 3DES; 3DESE. 3DES (Triple DES). Topic Type Associations. ... Topic Associations.
3DES has been standardized by: NIST. Topic mentioned in... DES · S-HTTP. ...
dret.net/glossary/tripledes - 8k - Cached - Similar pages

Triple DES (3DES) Encryption | ATM Marketplace Research
Triple DES (3DES) Encryption - <P>With industry mandates to move toward Triple
DES (3DES) encryption, it is a top-of-the-mind issue for everyone in the ATM ...
www.atmmarketplace.com/research.htm?pavilion=126 - 58k - Cached - Similar pages

3DES
3DES. ...
www.networksorcery.com/enp/data/3des.htm - 3k - Cached - Similar pages

3DES Source Code
3DES Source Code. This optimized 3DES implementation conforms to FIPS-46-3.
des.h. #ifndef _DES_H #define _DES_H #ifndef uint8 #define ...
www.cr0.net:8040/code/crypto/des/ - 26k - Cached - Similar pages

CAST 3DES Core
... For more information: contact Sales @ CAST. 3DES Triple DES Cryptoprocessor
Core. ... DES cryptoprocessor. 3DES triple-DES cryptoprocessor. MD5 processor. ...
www.cast-inc.com/cores/3des/index.shtml - 39k - Cached - Similar pages

Microsoft Windows XP - Enabling 3DES
You can strengthen security by replacing the default DESX algorithm with 3DES.
In a stand-alone environment, enabling 3DES is recommended. ... Enabling 3DES. ...
www.microsoft.com/technet/prodtechnol/ winxppro/reskit/prnb_efs_cbhn.asp - 9k - Cached - Similar pages



Result Page:  
 
1
2
3
4
5
6
7
8
9
10
Next

The first one is pretty good.
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 
LVL 13

Expert Comment

by:Webstorm
ID: 10726778
Hi twobitadder,

The first link match my comment (i also used google).
You should give the URL : http://www.google.com/search?sourceid=navclient&hl=en&ie=UTF-8&oe=UTF-8&q=3DES 

0
 
LVL 9

Expert Comment

by:mmuruganandam
ID: 10886634
no objections...
0
 
LVL 30

Expert Comment

by:Mayank S
ID: 10887461
Thanks. BTW, we could have had a split, but 20 points are too less to split between 2 experts.
0
 
LVL 9

Expert Comment

by:mmuruganandam
ID: 10887477
hahahahah...
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Title # Comments Views Activity
JAVA part two 5 57
Java array passed to SQL where clause 23 61
java jdbc batch example 8 19
use lov values 2 18
For customizing the look of your lightweight component and making it look lucid like it was made of glass. Or: how to make your component more Apple-ish ;) This tip assumes your component to be of rectangular shape and completely opaque. (COD…
Java had always been an easily readable and understandable language.  Some relatively recent changes in the language seem to be changing this pretty fast, and anyone that had not seen any Java code for the last 5 years will possibly have issues unde…
Viewers will learn about if statements in Java and their use The if statement: The condition required to create an if statement: Variations of if statements: An example using if statements:
This tutorial will introduce the viewer to VisualVM for the Java platform application. This video explains an example program and covers the Overview, Monitor, and Heap Dump tabs.

919 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

15 Experts available now in Live!

Get 1:1 Help Now