Multiple DES - Data Encryption Algorithms - Introduction To Network Security: Theory And Practice (2015)

Introduction To Network Security: Theory And Practice (2015)

Chapter 2. Data Encryption Algorithms

2.3 Multiple DES

As discussed in Section 2.2.6, applying DES multiple times can effectively extend the length of encryption keys without modifying DES. Multiple DES can therefore be used to resist brute-force attacks. We use imageDES to denote a multiple DES scheme of applying DES imagetimes. By applying DES, it means applying either the encryption algorithm image or the decryption algorithm image.

2.3.1 Triple-DES with Two Keys

Triple-DES with two keys, denoted by 3DES/2, is the simplest and reasonably secure method against brute-force attacks. It extends the key length to 112 bits long. Let image and image be two 56-bit encryption keys and image a 64-bit plaintext block. The standard 3DES/2 encryption algorithm applies image on image to obtain image, then applies image on image to obtain image, and finally applies image on image to obtain image. That is,

2.7equation

For convenience, we denote this scheme by image.

The following is the 3DES/2 decryption algorithm:

2.8equation

For convenience, we denote this scheme by image.

We note that there are other combinations for 3DES with two keys, such as image or image. Any of these combinations would serve the purpose. However, only the combination of image allows us to use 3DES/2 to decrypt ciphertext string produced by applying single DES with key image. This is done as follows: let image and let image. Then

equation

A major drawback of 3DES is that its software executions are not as efficient as one would like them to be.

2.3.2 2DES and 3DES/3

In addition to 3DES/2, we may also apply DES twice with two keys, denoted by 2DES/2. For simplicity, we use 2DES to denote 2DES/2. Let image and image be two DES encryption keys and image a 64-bit plaintext block. The standard 2DES encryption algorithm image and decryption algorithm image are described as follows:

equation

However, 2DES is vulnerable to the meet-in-the-middle attack (see Section 2.3.3 for details). Thus, 2DES is considered nonsecure.

We may also apply DES thrice with three keys, denoted by 3DES/3. 3DES/3 has an effective key length of 168 bits. Let image, and image be three encryption keys. The standard 3DES/3 encryption algorithm image and decryption algorithm image are described as follows:

2.9equation

2.10equation

2.3.3 Meet-in-the-Middle Attacks on 2DES

2DES is vulnerable to the meet-in-the-middle attacks. Suppose that the attacker has obtained two plaintext–ciphertext pairs image and image, where

equation

That is,

equation

The attacker may then be able to identify, with probability close to 1, the encryption keys image and image with time complexity much smaller than image. The attack can be carried out as follows:

List all 56-bit strings image and calculate, for each pair image,

equation

Note that when image and image, we have image. Thus, for each pair image with image, it is possible that image. If there is only one such pair, then we have found the encryption keys image and image. Otherwise, apply each pair image with image on image to obtain

equation

Again, we note that when image and image, we have image. Thus, if image, then image is more likely to be the encryption key pair. Indeed, we can show that the possibility that there exist more than one such pair is very small.

Note that for any plaintext block image and any candidate image for the encryption key pair, the ciphertext block image is uniformly distributed (or close to being uniformly distributed). This is the property any good encryption algorithm should possess. Because image, there are image pairs image. As image, the expected number of pairs image that satisfy image is or near

equation

Likewise, the expected number of pairs image from these image pairs that satisfy image and image is or near

equation

Thus, the possibility of finding image is or near image.

The time complexity of executing this attack is in the order of

equation

This is much smaller than image.