Multiple Encryption and Triple DES

Поделиться
HTML-код
  • Опубликовано: 22 ноя 2024

Комментарии • 14

  • @subhashishnabajja9563
    @subhashishnabajja9563 Год назад +3

    Nice video, it was very helpful. But can you explain all the possible attacks on the Triple DES encryption system. It would be very helpful.

  • @lakshminarayananallamothu6695
    @lakshminarayananallamothu6695 Год назад +6

    What happens if there more than one match? Then, How will the attacker comes to know which one is correct intermediate text?

  • @HarshaPriyaG-g4h
    @HarshaPriyaG-g4h 8 месяцев назад

    Please provide the numericals sums and solutions for Double DES.

  • @030_tajamulhassan2
    @030_tajamulhassan2 6 месяцев назад +5

    00:03 Understanding the drawbacks of DES and exploring multiple encryption and Triple DES
    02:22 Multiple encryption enhances security.
    04:31 Triple DES involves using K1 and K2 for encryption and decryption
    06:35 Triple DES encrypts plaintext to ciphertext and then decrypts it back
    08:36 Understanding the vulnerability to meet in the middle attack in double DES
    10:42 Once the key is known to the attacker, confidentiality is compromised.
    12:44 Attacker uses an exhaustive search to find the intermediary ciphertext.
    14:41 Explanation of the meet in the middle attack
    16:48 Triple DES involves encryption two times and decryption one time.
    18:39 Triple DES uses two keys for encryption and decryption.
    20:27 Triple DES has two variations with two keys and three keys

  • @dipu8869
    @dipu8869 11 месяцев назад

    all videos are amzing thankyou

  • @adityarajsinhchauhan7151
    @adityarajsinhchauhan7151 Год назад +1

    I have question you explained triple des with 2 keys but if you encrypt first then decrypt same then again encrypt it is as same as doing single time decryption

    • @VijaySimha-jf3mi
      @VijaySimha-jf3mi 11 месяцев назад +1

      No, because the decryption is done in the second step is with different key when compared to the key used in encryption

  • @nniharika6705
    @nniharika6705 Год назад

    can you please provide blowfish concept sir

  • @MC_AUR_BC_COMPONY
    @MC_AUR_BC_COMPONY Год назад +1

    🎉🎉

  • @fernandoaugustobrativedana8370
    @fernandoaugustobrativedana8370 17 дней назад

    i didnt get why a hacker would have the plaintext? if he had that why he would be hacking the algoritm?

    • @ranjanakhara167
      @ranjanakhara167 12 дней назад +3

      Hacker doesn't have the plaintext of the current message, he has the plaintext and ciphertext pair for probably some previous message... now, he needs to find the keys for cracking the message that can be sent in the future
      The goal is to find the keys, which he does by the previous plaintext and ciphertext pair, and now he can understand all the messages sent afterwards since he has the keys now

    • @fernandoaugustobrativedana8370
      @fernandoaugustobrativedana8370 11 дней назад

      @@ranjanakhara167 oh, i can see the whole picture now, thanks for your explanation

  • @Theias_27
    @Theias_27 Год назад

    ❤❤