26.10.2012 Views

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

Internet Security - Dang Thanh Binh's Page

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

72 INTERNET SECURITY<br />

P<br />

P<br />

K1 K2 K3<br />

E<br />

D<br />

D<br />

(a) Encryption<br />

K1 K2 K3<br />

E<br />

(b) Decryption<br />

Figure 3.5 Triple DES encryption/decryption.<br />

The receiver decrypts with the third key K3, then encrypts with the second key K2,<br />

and finally decrypts with the first key K1. This process is sometimes known as Encrypt-<br />

Decrypt-Encrypt (EDE) mode.<br />

Example 3.6 Using Figure 3.5, the triple DES computation is considered here.<br />

Given three keys:<br />

K1 = 0x260b152f31b51c68<br />

K2 = 0x321f0d61a773b558<br />

K3 = 0x519b7331bf104ce3<br />

and the plaintext P = 0x403da8a295d3fed9<br />

The 16-round keys corresponding to each given key K1, K2 and K3 are computed as<br />

shown below.<br />

Round K1 K2 K3<br />

1 000ced9158c9 5a1ec4b60e98 03e4ee7c63c8<br />

2 588490792e94 710c318334c6 8486dd46ac65<br />

3 54882eb9409b c5a8b4ec83a5 575a226a8ddc<br />

4 a2a006077207 96a696124ecf aab9e009d59b<br />

5 280e26b621e4 7e16225e9191 98664f4f5421<br />

6 e03038a08bc7 ea906c836569 615718ca496c<br />

7 84867056a693 88c25e6abb00 4499e580db9c<br />

E<br />

D<br />

C

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!