--%>

Middle portion of 3DES

Explain middle portion of the 3DES a decryption rather than the encryption?

E

Expert

Verified

Decryption requires that the keys be applied in the reverse order:

P=Dk1 [Ek1 [P]]

This causes in the dramatic increase in the cryptographic strength. The use of DES results in the mapping which is not equivalent to the single DES encryption.

   Related Questions in Computer Network Security

  • Q : What is meet-in-the-middle attack

    Explain what is meet-in-the-middle attack?

  • Q : Public key cryptography Explain the

    Explain the application of public key cryptography.

  • Q : Components in a typical security policy

    There are numerous components in a typical security policy. Explain three important components.

  • Q : Security and Recovery in networking

    Security and Recovery: While dealing with network security and information security audit, there are many small but critical things which plays very significant role and need to handle very carefully. Subsequent to the last security audit, it is essen

  • Q : IP addressing and Subnetting

    Assumption: All subnet values can be used and the all "0"s is the first subnet. Question 1 - You have been assigned the 160.5

  • Q : The purpose of data security 1.

    1. Introduction: The purpose of data security is to ensure the business continuity and minimize damage by Preventing and minimizing the effect of security incidents. Data and Information security management gives an enabling mechanism to share information which ensures the protection of informatio

  • Q : Suppose you worked for a US- based

    Suppose you worked for a US- based company that wanted to develop its own MIB for managing a product line. Where in the object identifier tree would it be registered? ( Hint: You’ll have to do some digging through RFCs or other documents to answer this question.)

  • Q : Primitive operations in RC5 Explain the

    Explain the primitive operations which are used in the RC5?

  • Q : Network layers What are the methods

    What are the methods used by a station to sense whether a station is idle or busy? Explain with a neat diagram.

  • Q : Access control list or ACL ACL (Access

    ACL (Access control list): In order to control the access to a particular number of users the wireless network makes use of ACL which is access control list. In this the unique address of the clients or the users are used and hence a check can be put