Linked Questions
13 questions linked to/from Is DES secure under CBC?
0 votes
1 answer
103 views
Calculating DES key knowing message before and after encryption [duplicate]
I've 8 bytes before encryption (for example: 01 02 03 04 05 06 07 08) and 8 bytes after DES encryption: ...
13 votes
2 answers
4k views
Is a small size block cipher usable?
Consider a block cipher with a key of size 128 bits but a small block size, say 32 bits. Is this kind of block cipher secure? I would like to know to what extent I can use a small block cipher, like ...
9 votes
2 answers
4k views
Why does NIST want 112-bit security from 128-bit key size for lightweight cryptography?
In NIST's Submission Requirements and Evaluation Criteria for the Lightweight Cryptography Standardization Process document it is stated that: 3.1 AEAD (Authenticated Encryption with Associated Data) ...
6 votes
3 answers
2k views
Good layperson analogy for password and encryption keys
NOTE: QUESTION UPDATED. SEE BOTTOM OF THIS POST. I'm writing something where I need to make someone come across as though they know cryptography. I don't know enough, but as cryptography plays only a ...
4 votes
2 answers
4k views
How does blocksize affect security?
I have recently read about how blockciphers and how stream ciphers work, and although I think I finally got everything right, I'm still wondering how increasing blocksize increases security.
2 votes
3 answers
2k views
3DES security when K1=K3
I am mainly looking for security on 2-key $\operatorname{3DES}$ implementation where $K_1=K_3$. How hard or easy is it to crack $\operatorname{3DES}$ when $K_1=K_3$?
1 vote
1 answer
2k views
Understanding LFSR stream ciphers and the content scrambling system
I'm a little confused over how exactly Linear Feedback Shift Registers (LFSR) work, I kind of get it, but not really, can someone help me understand it? I know it XORs bits in a loop against some mask,...
0 votes
3 answers
384 views
Do we want to allow/Have we allowed parallelization (e.g GPU programming) to enter the cryptographic field? What are the consequences?
With the term GPU programming, I'm referring to highly parallelizable computing in general. Lastly, I have built a bit of a background in cryptography. So I have started to wonder if/where GPU ...
3 votes
1 answer
546 views
Can we use Bitcoin miner to break 2Key 3DES, if yes how long it takes?
As ASICs are specifically designed to generate the hash for a block of a block chain. which is much faster than other GPUs which are used to break 2key-3DES. can we use Array of ASICs to break 2key-...
0 votes
1 answer
574 views
DES-CBC with random IV - how big is the keyspace? Can COTS tools crack it?
I've spent the night reversing the implementation of the 'Basic Text Encryptor' from Jasypt [1]. The algorithm is defined in documentation as 'PBEWithMD5AndDES'. The implementation is this: A random ...
0 votes
1 answer
305 views
Brute force strategy
I am a beginner in this field, and I was thinking about brute force strategies to break symmetric key encryption. Let's say we have a block cipher in CTR mode and the key is 56 bits in size. What ...
1 vote
2 answers
389 views
AES-128 with doubled 8Byte key
Assuming I encrypt data with AES-128 and a random 8-byte key x in the following way: ...
1 vote
1 answer
70 views
Alternatives to simple bit-measured security for ciphers
For a cryptographic primitive, we usually see the security level measured in bits, where n-bit security means that the attacker would have to perform $2^n$ operations to break it. For key-derivation ...