mailing list archives
Re: Strength of Triple-DES
From: isdmill () gatekeeper ddp state me us (David Miller)
Date: Tue, 18 Apr 1995 11:35:32 -0400 (EDT)
On Thu, 13 Apr 1995, Dave Stagner wrote:
As I understand it, triple-DES is not simply "three times stronger"
than regular DES, but actually an order of magnitude stronger. Rather
than encrypting three times, you encrypt, decrypt, and encrypt again
with different keys. And trying to decrypt garbage is far more
difficult than decrypting plaintext.
128 bit keys are much more than an order of magnitude stronger than 56
bit keys, but if you're only mapping 7 bytes -> 7 bytes I'm not sure
it really matters.....
I realize that the primary method of crack is guessing weak passwords,
but it also attempts to decrypt. And given the weakness of
First, unix passwords (which this thread started discussing) aren't
DES encrypted: they are used as a key to encrypt a piece of plain
text with a variation of DES. It is generally accepted that this
encryption process is not reversible, thus making it unlikely that
crack is decrypting anything.
single-DES, it isn't that hard. So anything that improves
cryptographic strength is good. Also, it reduces the harm caused by
weak passwords, and adds value to strong passwords.
Sorry, but weak passwords will be just as vulnerable with stong
cryptography as weak - using a word in the GECOS field will yield a
password to crack no matter the encryption used.
It *would* increase the value of good passwords, as long as those
passwords are not broadcast in the clear, written down and posted on
I also realize that the ideal solution would be to eliminate fixed
passwords and replace them with some sort of double-blind,
smart-client scheme. But it won't work, not as long as we're
dependent on existing clients like telnet and ftp working. I'd say
that we're pretty much stuck with the current methodology as long as
we're stuck with unix and the Internet. That leaves improving the
existing scheme as our best hope. If you have any *feasable*
solutions, I'd be very interested.
Actually, something like telnet and ftp *require* intelligent devices
on the other end, thus lending themselves to secure adaptations of the
protocol. And I believe that these options are beginning to creep
in. One of the best ways to deal with this is with public key
cryptography, which is patented until next year.
Perhaps in a years time things will be very different:)
* David Faron Stagner
* National Computer Systems david_stagner () ic ncs com
* 2510 N Dodge St vox 319 354 9200 ext 6884
* Iowa City, IA 52244 fax 319 339 6555
I disclaim my employer and I'm sure they'd disclaim me too.
(This .sig has been sanitized for your protection)
It's *amazing* what one can accomplish when
one doesn't know what one can't do!