Advertisement
If you have a new account but are having problems posting or verifying your account, please email us on hello@boards.ie for help. Thanks :)
Hello all! Please ensure that you are posting a new thread or question in the appropriate forum. The Feedback forum is overwhelmed with questions that are having to be moved elsewhere. If you need help to verify your account contact hello@boards.ie
Hi there,
There is an issue with role permissions that is being worked on at the moment.
If you are having trouble with access or permissions on regional forums please post here to get access: https://www.boards.ie/discussion/2058365403/you-do-not-have-permission-for-that#latest

Triple-DES question

  • 08-11-2005 2:40pm
    #1
    Closed Accounts Posts: 13


    hey. i have this triple des problem below. now i dont require the solution but the last question puzzles me.

    You are given the following information:


    A triple DES system has encrypted a message using a DESede key with no mode and no padding giving the following ciphertext,

    IkUO7dHZXN4JQYkRE6mMUs3Yg25U/eyE/u0z+7gae04pSDM2RtwRGQ==

    It is known that the key generator is weak with all keys following the pattern below

    11:11:11:11:11:11:00:00:XY:XY:XY:XY:XY:XY:00:00:WZ:WZ:WZ:WZ:WZ:WZ:00:00

    where XY and WZ are unknown bytes, for example XY could be 11110001.


    Your task is to find the key and decrypt the ciphertext.

    Also more than one key may decrypt, can you explain this??

    When is it possible to have more than one key able to decrypt if k1,k2,k3 are all different???


Comments

  • Closed Accounts Posts: 59 ✭✭crashedmind


    sed wrote:
    hey. i have this triple des problem below. now i dont require the solution but the last question puzzles me.

    You are given the following information:


    A triple DES system has encrypted a message using a DESede key with no mode and no padding giving the following ciphertext,

    IkUO7dHZXN4JQYkRE6mMUs3Yg25U/eyE/u0z+7gae04pSDM2RtwRGQ==

    It is known that the key generator is weak with all keys following the pattern below

    11:11:11:11:11:11:00:00:XY:XY:XY:XY:XY:XY:00:00:WZ:WZ:WZ:WZ:WZ:WZ:00:00

    where XY and WZ are unknown bytes, for example XY could be 11110001.


    Your task is to find the key and decrypt the ciphertext.
    Bruteforce should be quick enough since there are only 64K keys (ignoring parity you have 256 possible value of XY and 256 values of WZ). This assumes you can recognise the decrypted message when you get it e.g. it's an ascii string.
    sed wrote:
    Also more than one key may decrypt, can you explain this??

    When is it possible to have more than one key able to decrypt if k1,k2,k3 are all different???

    Lost of answers depending on how these statements are interpreted:
    1. Any key can decrypt - but you need the right one to get the right plaintext :)
    2. Keys could be the same except for parity bits.
    3. Keys could be weak/semiweak.


Advertisement