Questions tagged [des]
Data Encryption Standard (DES) is a symmetrical encryption algorithm.
49 questions
-1 votes
1 answer
292 views
Where could I find a list of keys not to use for DES encrypting
We have a process that encrypts a URL, it uses DES encryption. I suspect someone may have figured out the key and is decrypting it to crawl information. This was set up many years ago, I just want to ...
3 votes
2 answers
6k views
Why encrypting with ECB block cipher mode provides different result?
I'm playing around with openssl command line to verify my understanding on block cipher mode. I read that ECB block cipher mode always encrypt the same text to the same output. AES operates on 16 ...
1 vote
1 answer
4k views
What is the difference between EDE and EDE3?
I was going through the OpenSSL cipher algorithms list. I found these two: des-ede-cbc des-ede3-ofb What does that exactly mean? What is the difference between EDE and EDE3? What are the key-size and ...
3 votes
2 answers
2k views
What if the attacker tamper the IV used in the block cipher CBC mode?
I am a newbie to block cipher and when learning the CBC mode, I start to understand that an IV is being used in this mode and also will be transferred to the message receiver. So here is my question,...
2 votes
1 answer
271 views
Why are Wikipedia's listed DES semi-weak key pairs 16 bytes?
I'm trying to complete an encryption based CTF and am testing for the use of DES encryption with weak or semi-weak key pairs by taking the keys listed on wikipedia (https://en.wikipedia.org/wiki/...
2 votes
2 answers
436 views
Private key DES password
If I have a SSL private key that is encrypted with a DES password, and I have to share with another admin a NODES copy of the private key, can the other admin determine what my DES password is?
-4 votes
2 answers
453 views
Strength Blowfish and DES with current quantic computing and mandating backdoors
What is the strength of algorithms such as DES (Rijndael) and Blowfish used in password manager Safe password, with the current development (2018) of quantum computing, the former parallel processing, ...
2 votes
2 answers
740 views
What would be a better encryption algorithm then RSA_DES_EDE3_CBC?
First off, please let me explain why I'm asking this at all: The default implementation of EnvelopedCms is using AlgorithmIdentifier which by itself will use RSA_DES_EDE3_CBC or OID 1.2.840.113549.3....
0 votes
2 answers
8k views
In cyptography what is "Key Space"?
What is a Key space and how does it relate to the strength of a cryptosystem? Comment on the strength of the DES algorithm with a 56 bit key. What relevance does the key space have for passwords? ...
1 vote
2 answers
3k views
Decrypting Des encryption
I am interested in learning different encryption techniques and i am trying to understand one implementation in-particular. I have set the password in the application and now want to understand how ...
9 votes
3 answers
23k views
Is the 3DES algorithm secure?
Can we use the 3DES algorithm for exchanging confidential information? I am using it in my project. Security code reviewer has raised a bug saying that it is not secure but I see that it is mentioned ...
2 votes
1 answer
307 views
3DES Security - safe use cases
What are safe use cases for 3DES? Is it safe to use it in situations where you are encrypting smaller amounts of data? After the recently published 'birthday attacks' on 3DES (eg SWEET32), I've read ...
-1 votes
1 answer
491 views
Which protocols are the most secure to achieve authentication and encryption for a client downloading data from a sever?
I'm new to Information Security so please bear with me if this question is quite trivial. I want to design a secure protocol that allows someone to download a piece of data that belongs to them from ...
2 votes
1 answer
5k views
what does key size (64 bit) in DES means
I im taking cryptography classes and learned that the key size of DES is 64 bits. So if the key is array of Alphabetic char, and 1 char takes 8 bits then 64/8 = 8 . So the key can be only 8 char ...
11 votes
2 answers
3k views
The reason of using XOR operation in cryptographic algorithms
I notice that some cryptographic algorithms involve using XOR operation with the key (Even AES uses XOR to derive the round keys). My question is why specifically XOR? How about OR or NAND or some ...