2-KEY TRIPLE ENCRYPTION

Citation
Ib. Damgard et Lr. Knudsen, 2-KEY TRIPLE ENCRYPTION, Journal of cryptology, 11(3), 1998, pp. 209-218
Citations number
14
Categorie Soggetti
Computer Science Theory & Methods",Mathematics,"Computer Science Theory & Methods","Engineering, Eletrical & Electronic",Mathematics
Journal title
ISSN journal
09332790
Volume
11
Issue
3
Year of publication
1998
Pages
209 - 218
Database
ISI
SICI code
0933-2790(1998)11:3<209:>2.0.ZU;2-I
Abstract
In this paper we consider multiple encryption schemes built from conve ntional cryptosystems such as DES. The existing schemes are either vul nerable to variants of meet-in-the-middle attacks, i.e., they do not p rovide security corresponding to the full key length used or there is no proof that the schemes are as secure as the underlying cipher. We p ropose a variant of two-key triple encryption with a new method of gen erating three keys from two. Our scheme is not vulnerable to the meet- in-the-middle attack and, under an appropriate assumption, we can show that our scheme is at least about as hard to break as the underlying block cipher.