00:03 Understanding the drawbacks of DES and exploring multiple encryption and Triple DES 02:22 Multiple encryption enhances security. 04:31 Triple DES involves using K1 and K2 for encryption and decryption 06:35 Triple DES encrypts plaintext to ciphertext and then decrypts it back 08:36 Understanding the vulnerability to meet in the middle attack in double DES 10:42 Once the key is known to the attacker, confidentiality is compromised. 12:44 Attacker uses an exhaustive search to find the intermediary ciphertext. 14:41 Explanation of the meet in the middle attack 16:48 Triple DES involves encryption two times and decryption one time. 18:39 Triple DES uses two keys for encryption and decryption. 20:27 Triple DES has two variations with two keys and three keys
I have question you explained triple des with 2 keys but if you encrypt first then decrypt same then again encrypt it is as same as doing single time decryption
Hacker doesn't have the plaintext of the current message, he has the plaintext and ciphertext pair for probably some previous message... now, he needs to find the keys for cracking the message that can be sent in the future The goal is to find the keys, which he does by the previous plaintext and ciphertext pair, and now he can understand all the messages sent afterwards since he has the keys now
Nice video, it was very helpful. But can you explain all the possible attacks on the Triple DES encryption system. It would be very helpful.
What happens if there more than one match? Then, How will the attacker comes to know which one is correct intermediate text?
Please provide the numericals sums and solutions for Double DES.
00:03 Understanding the drawbacks of DES and exploring multiple encryption and Triple DES
02:22 Multiple encryption enhances security.
04:31 Triple DES involves using K1 and K2 for encryption and decryption
06:35 Triple DES encrypts plaintext to ciphertext and then decrypts it back
08:36 Understanding the vulnerability to meet in the middle attack in double DES
10:42 Once the key is known to the attacker, confidentiality is compromised.
12:44 Attacker uses an exhaustive search to find the intermediary ciphertext.
14:41 Explanation of the meet in the middle attack
16:48 Triple DES involves encryption two times and decryption one time.
18:39 Triple DES uses two keys for encryption and decryption.
20:27 Triple DES has two variations with two keys and three keys
all videos are amzing thankyou
I have question you explained triple des with 2 keys but if you encrypt first then decrypt same then again encrypt it is as same as doing single time decryption
No, because the decryption is done in the second step is with different key when compared to the key used in encryption
can you please provide blowfish concept sir
🎉🎉
i didnt get why a hacker would have the plaintext? if he had that why he would be hacking the algoritm?
Hacker doesn't have the plaintext of the current message, he has the plaintext and ciphertext pair for probably some previous message... now, he needs to find the keys for cracking the message that can be sent in the future
The goal is to find the keys, which he does by the previous plaintext and ciphertext pair, and now he can understand all the messages sent afterwards since he has the keys now
@@ranjanakhara167 oh, i can see the whole picture now, thanks for your explanation
❤❤