SESSION 7
MULTIPLE ENCRYPTION
CREATED BY K. VICTOR BABU
INTRODUCTION
This session provides an overview of multiple encryption
concepts. This session also discusses to illustrate Double
DES & Triple DES algorithms.
CREATED BY K. VICTOR BABU
MULTIPLE ENCRYPTION
The process of encrypting data more than once using
several encryption algorithms or keys is known as
multiple encryption, sometimes known as cascade
encryption or nested encryption.
In cryptography, multiple encryption is used to
increase the security and confidentiality of sensitive
data. Here are some important details regarding the
intent behind multiple encryption
CREATED BY K. VICTOR BABU
PURPOSE OF MULTIPLE ENCRYPTION
• Increased Security
• Defense against Cryptanalysis
• Protection against Key Compromise
• Increased Key Space
• Defense against Algorithm Vulnerabilities
• Compliance with Security Standards
• Flexibility and Adaptability
CREATED BY K. VICTOR BABU
DOUBLE DES
CREATED BY K. VICTOR BABU
DOUBLE DES
Encryption
Consider 64 bits of plaintext and encrypt plaintext
using DES algorithm that uses subkey K1.. The
intermediate output X is again reencrypted with
DES algorithm that uses subkey K2. Finally we get
ciphertext C.
CREATED BY K. VICTOR BABU
DOUBLE DES
Decryption:
Consider 64 bits of ciphertext and decrypt
ciphertext using DES algorithm that uses subkey
K2. The intermediate output X is again decrypted
with DES algorithm that uses subkey K1. Finally we
get plaintext P.
CREATED BY K. VICTOR BABU
TRIPLE DES WITH TWO KEYS
CREATED BY K. VICTOR BABU
TRIPLE DES WITH TWO KEYS
• Encryption:
Consider 64 bits of plaintext and encrypt plaintext using
DES algorithm that uses subkey K1.. The intermediate
output A is again reencrypted with DES algorithm that
uses subkey K2. The intermediate output C is again
reencrypted with DES algorithm that uses subkey K1. Finally
we get ciphertext C.
CREATED BY K. VICTOR BABU
TRIPLE DES WITH TWO KEYS
Decryption:
Consider 64 bits of ciphertext and decrypt ciphertext using
DES algorithm that uses subkey K1.. The intermediate
output B is again reencrypted with DES algorithm that
uses subkey K2. The intermediate output C is again
redecrypted with DES algorithm that uses subkey K1. Finally
we get ciphertext C.
CREATED BY K. VICTOR BABU
TRIPLE DES WITH THREE KEYS
CREATED BY K. VICTOR BABU
TRIPLE DES WITH THREE KEYS
• Encryption:
Consider 64 bits of plaintext and encrypt plaintext using
DES algorithm that uses subkey K1.. The intermediate
output A is again reencrypted with DES algorithm that
uses subkey K2. The intermediate output C is again
reencrypted with DES algorithm that uses subkey K3. Finally
we get ciphertext C.
CREATED BY K. VICTOR BABU
TRIPLE DES WITH THREE KEYS
Decryption:
Consider 64 bits of ciphertext and decrypt ciphertext
using DES algorithm that uses subkey K3. The
intermediate output B is again reencrypted with DES
algorithm that uses subkey K2. The intermediate output C
is again redecrypted with DES algorithm that uses subkey
K1. Finally we get ciphertext C.
CREATED BY K. VICTOR BABU
SUMMARY
Multiple encryption can boost security while also
adding complexity, increasing processing
requirements, and perhaps creating compatibility
issues. To ensure successful implementation and
uphold the intended level of security, careful
evaluation of the encryption algorithms employed, key
management, and performance trade-offs is necessary.
CREATED BY K. VICTOR BABU
SELF ASSESSMENT QUESTIONS
1. What does cryptography's multiple encryption mean?
a. Encrypting the same message multiple times with the same algorithm
and key.
b. Encrypting the same message multiple times with different algorithms
and keys.
c. Encrypting different messages with the same algorithm and key.
d. Encrypting different messages with different algorithms and keys.
2. What does multiple encryption serve?
a. Increase the speed of encryption and decryption.
b. Improve the availability of encrypted data.
c. Enhance the security and confidentiality of sensitive information.
d. Simplify the encryption process.
CREATED BY K. VICTOR BABU
SELF ASSESSMENT QUESTIONS
3. How is security enhanced by multiple encryption?
a. By reducing the key space required for encryption.
b. By minimizing the number of encryption algorithms used.
c. By increasing the complexity of the encryption process.
d. By improving the efficiency of encryption algorithms.
4. What kind of defense can multiple encryption offer?
a. Key management challenges.
b. Cryptanalysis attacks.
c. Data transmission errors.
d. Network vulnerabilities.
CREATED BY K. VICTOR BABU
TERMINAL QUESTIONS
1. Summarize the purpose of multiple encryptions.
2. Demonstrate Double Data Encryption Standard (Double DES).
3. Illustrate Triple Data Encryption Standard (Triple DES) with two keys with
a neat diagram.
4. Demonstrate Triple Data Encryption Standard (Triple DES) with three keys
with a neat diagram.
5. Summarize Multiple Encryption and its associated algorithms.
CREATED BY K. VICTOR BABU
REFERENCES
1. Cryptography and Network Security Principles and Practice, by William
stallings, Pearson, 5th edition.
2.Applied Cryptography: Protocols, Algorthms, and Source Code in C , by Bruce
Schneier, Second Edition , John Wiley & Sons, Inc., 2015.
3.Applied Cryptography for Cyber Security and Defense: Information Encryption
and Cyphering, by Hamid R. Nemati and Li Yang, IGI Global, 2011
4.Forouzon B, “Cryptography and Network Security,” Indian Edition, TMH (2010).
CREATED BY K. VICTOR BABU
THANK YOU
Team – CA&CD
CREATED BY K. VICTOR BABU