Link to home
Start Free TrialLog in
Avatar of David
DavidFlag for United States of America

asked on

3DES process

i'm missing something in my cryptography understanding.

i've looked through several sources and want to verify im getting this right.

the 3DES process:

3 56 bit keys act on a 64 bit block of data.
Key1 encrypts the data, Key 2 decrypts the data, and then Key3 encrypts the data
some implementations use the same key for Key1 and Key3, so effectively in those implementations the total key length is 112, if 3 different keys are used, it's 168 bits.

so, we send the data across the wire and we want to decrypt it.

we take Key3 to decrypt the ciphertext, which still yields ciphertext, because we have to encrypt this ciphertext with Key2, and then go through the 3rd step which is to decrypt that ciphertext, and finally get plaintext.

is this correct?

any further input is very welcome

thanks,

-Dave.J
Avatar of noci
noci

Yes AFAICT, but why not use one of teh GPG or OPENSSL encrypt/decrypt with the right parameters....
3DES is deprecated for real world use btw,  because of to small a keysize and there have been found some weeknesses.
Correct. Why the interest in 3DES?
Avatar of David

ASKER

CyperOps, and other certifications require me to know it... and it's interesting

-dave.j
ASKER CERTIFIED SOLUTION
Avatar of btan
btan

Link to home
membership
This solution is only available to members.
To access this solution, you must be a member of Experts Exchange.
Start Free Trial
For author advice