Page 546 - StudyBook.pdf
P. 546

530    Chapter 9 • Basis of Cryptography

                  be increased. Both of these solutions tend to increase the processing
                  power required to encrypt and decrypt data and slow down the encryp-
                  tion/decryption speed, because of the increased number of mathemat-
                  ical operations required. Examples of modified DES include Triple Data
                  Encryption Standard (3DES) and DESX.




                 Each round consists of a substitution phase, wherein the data is substituted with
             pieces of the key, and a permutation phase, wherein the substituted data is scrambled
             (re-ordered). Substitution operations, sometimes referred to as confusion operations,
             occur within S-boxes. Similarly, permutation operations, sometimes called diffusion oper-
             ations, are said to occur in P-boxes. Both of these operations occur in the “F
             Module” of the diagram.The security of DES lies in the fact that since the substi-
             tution operations are non-linear, the resulting ciphertext does not resemble the
             original message.The permutation operations add another layer of security by
             scrambling the already partially encrypted message.



              TEST DAY TIP

                  Keep in mind that all of the operations mentioned above (substitution,
                  permutation, and so forth) are being performed on the data in binary
                  form. Instead of trading out letters and numbers, 1’s and 0’s are being
                  manipulated because these manipulations can be performed at high
                  speeds.




                 Triple DES (3DES) and DESX are methods that attempt to use the DES cipher
             in a way that increases its security.Triple DES uses three separate 56-bit DES keys
             as a single 168-bit key, though sometimes keys 1 and 3 are identical, yielding 112-
             bit security. DESX adds an additional 64 bits of key data. Both 3DES and DESX
             are intended to strengthen DES against brute-force attacks. It would take many
             years to decrypt 3DES encrypted date (depending on available computing power).
             However, 3DES is inefficient because it requires two to three times the processing
             overhead as a single DES.










          www.syngress.com
   541   542   543   544   545   546   547   548   549   550   551