[go: up one dir, main page]

0% found this document useful (0 votes)
22 views19 pages

Multiple Encryption

This document provides an overview of multiple encryption, focusing on Double DES and Triple DES algorithms. It outlines the purpose of multiple encryption, which includes increased security and defense against cryptanalysis, as well as the processes for encrypting and decrypting data using these algorithms. Additionally, it highlights the complexities and considerations necessary for effective implementation of multiple encryption methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
22 views19 pages

Multiple Encryption

This document provides an overview of multiple encryption, focusing on Double DES and Triple DES algorithms. It outlines the purpose of multiple encryption, which includes increased security and defense against cryptanalysis, as well as the processes for encrypting and decrypting data using these algorithms. Additionally, it highlights the complexities and considerations necessary for effective implementation of multiple encryption methods.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 19

SESSION 7

MULTIPLE ENCRYPTION

CREATED BY K. VICTOR BABU


INTRODUCTION

This session provides an overview of multiple encryption


concepts. This session also discusses to illustrate Double
DES & Triple DES algorithms.

CREATED BY K. VICTOR BABU


MULTIPLE ENCRYPTION

The process of encrypting data more than once using


several encryption algorithms or keys is known as
multiple encryption, sometimes known as cascade
encryption or nested encryption.
In cryptography, multiple encryption is used to
increase the security and confidentiality of sensitive
data. Here are some important details regarding the
intent behind multiple encryption

CREATED BY K. VICTOR BABU


PURPOSE OF MULTIPLE ENCRYPTION

• Increased Security
• Defense against Cryptanalysis
• Protection against Key Compromise
• Increased Key Space
• Defense against Algorithm Vulnerabilities
• Compliance with Security Standards
• Flexibility and Adaptability

CREATED BY K. VICTOR BABU


DOUBLE DES

CREATED BY K. VICTOR BABU


DOUBLE DES

Encryption
Consider 64 bits of plaintext and encrypt plaintext
using DES algorithm that uses subkey K1.. The
intermediate output X is again reencrypted with
DES algorithm that uses subkey K2. Finally we get
ciphertext C.

CREATED BY K. VICTOR BABU


DOUBLE DES

Decryption:
Consider 64 bits of ciphertext and decrypt
ciphertext using DES algorithm that uses subkey
K2. The intermediate output X is again decrypted
with DES algorithm that uses subkey K1. Finally we
get plaintext P.

CREATED BY K. VICTOR BABU


TRIPLE DES WITH TWO KEYS

CREATED BY K. VICTOR BABU


TRIPLE DES WITH TWO KEYS

• Encryption:
Consider 64 bits of plaintext and encrypt plaintext using
DES algorithm that uses subkey K1.. The intermediate
output A is again reencrypted with DES algorithm that
uses subkey K2. The intermediate output C is again
reencrypted with DES algorithm that uses subkey K1. Finally
we get ciphertext C.

CREATED BY K. VICTOR BABU


TRIPLE DES WITH TWO KEYS

Decryption:
Consider 64 bits of ciphertext and decrypt ciphertext using
DES algorithm that uses subkey K1.. The intermediate
output B is again reencrypted with DES algorithm that
uses subkey K2. The intermediate output C is again
redecrypted with DES algorithm that uses subkey K1. Finally
we get ciphertext C.

CREATED BY K. VICTOR BABU


TRIPLE DES WITH THREE KEYS

CREATED BY K. VICTOR BABU


TRIPLE DES WITH THREE KEYS

• Encryption:
Consider 64 bits of plaintext and encrypt plaintext using
DES algorithm that uses subkey K1.. The intermediate
output A is again reencrypted with DES algorithm that
uses subkey K2. The intermediate output C is again
reencrypted with DES algorithm that uses subkey K3. Finally
we get ciphertext C.

CREATED BY K. VICTOR BABU


TRIPLE DES WITH THREE KEYS

Decryption:
Consider 64 bits of ciphertext and decrypt ciphertext
using DES algorithm that uses subkey K3. The
intermediate output B is again reencrypted with DES
algorithm that uses subkey K2. The intermediate output C
is again redecrypted with DES algorithm that uses subkey
K1. Finally we get ciphertext C.

CREATED BY K. VICTOR BABU


SUMMARY

Multiple encryption can boost security while also


adding complexity, increasing processing
requirements, and perhaps creating compatibility
issues. To ensure successful implementation and
uphold the intended level of security, careful
evaluation of the encryption algorithms employed, key
management, and performance trade-offs is necessary.

CREATED BY K. VICTOR BABU


SELF ASSESSMENT QUESTIONS

1. What does cryptography's multiple encryption mean?


a. Encrypting the same message multiple times with the same algorithm
and key.
b. Encrypting the same message multiple times with different algorithms
and keys.
c. Encrypting different messages with the same algorithm and key.
d. Encrypting different messages with different algorithms and keys.
2. What does multiple encryption serve?
a. Increase the speed of encryption and decryption.
b. Improve the availability of encrypted data.
c. Enhance the security and confidentiality of sensitive information.
d. Simplify the encryption process.

CREATED BY K. VICTOR BABU


SELF ASSESSMENT QUESTIONS

3. How is security enhanced by multiple encryption?


a. By reducing the key space required for encryption.
b. By minimizing the number of encryption algorithms used.
c. By increasing the complexity of the encryption process.
d. By improving the efficiency of encryption algorithms.
4. What kind of defense can multiple encryption offer?
a. Key management challenges.
b. Cryptanalysis attacks.
c. Data transmission errors.
d. Network vulnerabilities.

CREATED BY K. VICTOR BABU


TERMINAL QUESTIONS

1. Summarize the purpose of multiple encryptions.


2. Demonstrate Double Data Encryption Standard (Double DES).
3. Illustrate Triple Data Encryption Standard (Triple DES) with two keys with
a neat diagram.
4. Demonstrate Triple Data Encryption Standard (Triple DES) with three keys
with a neat diagram.
5. Summarize Multiple Encryption and its associated algorithms.

CREATED BY K. VICTOR BABU


REFERENCES
1. Cryptography and Network Security Principles and Practice, by William
stallings, Pearson, 5th edition.

2.Applied Cryptography: Protocols, Algorthms, and Source Code in C , by Bruce


Schneier, Second Edition , John Wiley & Sons, Inc., 2015.

3.Applied Cryptography for Cyber Security and Defense: Information Encryption


and Cyphering, by Hamid R. Nemati and Li Yang, IGI Global, 2011

4.Forouzon B, “Cryptography and Network Security,” Indian Edition, TMH (2010).

CREATED BY K. VICTOR BABU


THANK YOU

Team – CA&CD

CREATED BY K. VICTOR BABU

You might also like