Skip to main content

Questions tagged [des]

Data Encryption Standard (DES) is a symmetrical encryption algorithm.

-1 votes
1 answer
292 views

We have a process that encrypts a URL, it uses DES encryption. I suspect someone may have figured out the key and is decrypting it to crawl information. This was set up many years ago, I just want to ...
Sanpopo's user avatar
  • 117
3 votes
2 answers
6k views

I'm playing around with openssl command line to verify my understanding on block cipher mode. I read that ECB block cipher mode always encrypt the same text to the same output. AES operates on 16 ...
emitrax's user avatar
  • 133
1 vote
1 answer
4k views

I was going through the OpenSSL cipher algorithms list. I found these two: des-ede-cbc des-ede3-ofb What does that exactly mean? What is the difference between EDE and EDE3? What are the key-size and ...
nmq's user avatar
  • 55
3 votes
2 answers
2k views

I am a newbie to block cipher and when learning the CBC mode, I start to understand that an IV is being used in this mode and also will be transferred to the message receiver. So here is my question,...
lllllllllllll's user avatar
2 votes
1 answer
271 views

I'm trying to complete an encryption based CTF and am testing for the use of DES encryption with weak or semi-weak key pairs by taking the keys listed on wikipedia (https://en.wikipedia.org/wiki/...
muke's user avatar
  • 135
2 votes
2 answers
436 views

If I have a SSL private key that is encrypted with a DES password, and I have to share with another admin a NODES copy of the private key, can the other admin determine what my DES password is?
rob daas's user avatar
-4 votes
2 answers
453 views

What is the strength of algorithms such as DES (Rijndael) and Blowfish used in password manager Safe password, with the current development (2018) of quantum computing, the former parallel processing, ...
Lazaro Campo's user avatar
2 votes
2 answers
740 views

First off, please let me explain why I'm asking this at all: The default implementation of EnvelopedCms is using AlgorithmIdentifier which by itself will use RSA_DES_EDE3_CBC or OID 1.2.840.113549.3....
omni's user avatar
  • 189
0 votes
2 answers
8k views

What is a Key space and how does it relate to the strength of a cryptosystem? Comment on the strength of the DES algorithm with a 56 bit key. What relevance does the key space have for passwords? ...
William's user avatar
  • 27
1 vote
2 answers
3k views

I am interested in learning different encryption techniques and i am trying to understand one implementation in-particular. I have set the password in the application and now want to understand how ...
Display Name's user avatar
9 votes
3 answers
23k views

Can we use the 3DES algorithm for exchanging confidential information? I am using it in my project. Security code reviewer has raised a bug saying that it is not secure but I see that it is mentioned ...
Ekalavya's user avatar
  • 164
2 votes
1 answer
307 views

What are safe use cases for 3DES? Is it safe to use it in situations where you are encrypting smaller amounts of data? After the recently published 'birthday attacks' on 3DES (eg SWEET32), I've read ...
Marcus's user avatar
  • 21
-1 votes
1 answer
491 views

I'm new to Information Security so please bear with me if this question is quite trivial. I want to design a secure protocol that allows someone to download a piece of data that belongs to them from ...
user3396592's user avatar
2 votes
1 answer
5k views

I im taking cryptography classes and learned that the key size of DES is 64 bits. So if the key is array of Alphabetic char, and 1 char takes 8 bits then 64/8 = 8 . So the key can be only 8 char ...
Danny Rock's user avatar
11 votes
2 answers
3k views

I notice that some cryptographic algorithms involve using XOR operation with the key (Even AES uses XOR to derive the round keys). My question is why specifically XOR? How about OR or NAND or some ...
Michael's user avatar
  • 423

15 30 50 per page