T*r
2 楼
http://www.rsasecurity.com/rsalabs/faq/3-2-6.html
【在 h**********r 的大作中提到】![](/moin_static193/solenoid/img/up.png)
: 能不能指点些资料查查, 或者任何idea, 多谢了!
【在 h**********r 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
: 能不能指点些资料查查, 或者任何idea, 多谢了!
h*r
3 楼
恩, get two paper in the reference list.
Thx.
【在 T********r 的大作中提到】![](/moin_static193/solenoid/img/up.png)
: http://www.rsasecurity.com/rsalabs/faq/3-2-6.html
Thx.
【在 T********r 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
: http://www.rsasecurity.com/rsalabs/faq/3-2-6.html
w*o
4 楼
1. It's a make-up scheme that defends exhaustive key search.
As key scheduling in Feistel structures incurs latency, 3DES
is very slow, normally can only get 1/3 speed of DES,
and 1/10 speed of AES.
2. Block size is only 64-bit, which is vulnerable to exhaustive
plaintext search when the input plaintext has low entropy.
For instance, English text has low entropy. Instead of
searching 2^64 random cases, you only need to search 2^26 (cannot
remember exact number) cases.
Othe
【在 h**********r 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
: 能不能指点些资料查查, 或者任何idea, 多谢了!
w*o
5 楼
3DES is not vulnerable to these academia attacks.
These RSA people don't know Shannon's pure cipher system,
where EDE equals to E (E: encryption, D:decryption).
So-called double encryption and double key problem are not
justifiable in theory, as Shannon's pure cipher theory implied,
but these RSA people (including Ron Rivest) don't read Shannon's
result, and invent a set of vulnerable schemes, then attack
the vulnerable schemes to attract attention.
This is really amazing.
【在 h**********r 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
: 恩, get two paper in the reference list.
: Thx.
h*r
6 楼
THX a lot!
【在 w*******o 的大作中提到】![](/moin_static193/solenoid/img/up.png)
:
: 3DES is not vulnerable to these academia attacks.
: These RSA people don't know Shannon's pure cipher system,
: where EDE equals to E (E: encryption, D:decryption).
: So-called double encryption and double key problem are not
: justifiable in theory, as Shannon's pure cipher theory implied,
: but these RSA people (including Ron Rivest) don't read Shannon's
: result, and invent a set of vulnerable schemes, then attack
: the vulnerable schemes to attract attention.
: This is really amazing.
【在 w*******o 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
:
: 3DES is not vulnerable to these academia attacks.
: These RSA people don't know Shannon's pure cipher system,
: where EDE equals to E (E: encryption, D:decryption).
: So-called double encryption and double key problem are not
: justifiable in theory, as Shannon's pure cipher theory implied,
: but these RSA people (including Ron Rivest) don't read Shannon's
: result, and invent a set of vulnerable schemes, then attack
: the vulnerable schemes to attract attention.
: This is really amazing.
h*r
7 楼
EDE == E? I remember I this is proven to be false in Stalling's
Cryptography and Network Security
【在 w*******o 的大作中提到】![](/moin_static193/solenoid/img/up.png)
:
: 3DES is not vulnerable to these academia attacks.
: These RSA people don't know Shannon's pure cipher system,
: where EDE equals to E (E: encryption, D:decryption).
: So-called double encryption and double key problem are not
: justifiable in theory, as Shannon's pure cipher theory implied,
: but these RSA people (including Ron Rivest) don't read Shannon's
: result, and invent a set of vulnerable schemes, then attack
: the vulnerable schemes to attract attention.
: This is really amazing.
Cryptography and Network Security
【在 w*******o 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
:
: 3DES is not vulnerable to these academia attacks.
: These RSA people don't know Shannon's pure cipher system,
: where EDE equals to E (E: encryption, D:decryption).
: So-called double encryption and double key problem are not
: justifiable in theory, as Shannon's pure cipher theory implied,
: but these RSA people (including Ron Rivest) don't read Shannon's
: result, and invent a set of vulnerable schemes, then attack
: the vulnerable schemes to attract attention.
: This is really amazing.
h*r
9 楼
Maybe I make myself misunderstood, I really mean EDE != E, but I have not
read the proof of this. Does Shannon provide any idea about this? I know
his paper is a milestone, I will go to read it for sure. :) thx.
【在 w*******o 的大作中提到】![](/moin_static193/solenoid/img/up.png)
:
: no, the term "equal" here is about the sample space.
: of course if "EDE=E", then why do the "DE" part?
: check Shannon's pure cipher for details.
read the proof of this. Does Shannon provide any idea about this? I know
his paper is a milestone, I will go to read it for sure. :) thx.
【在 w*******o 的大作中提到】
![](/moin_static193/solenoid/img/up.png)
:
: no, the term "equal" here is about the sample space.
: of course if "EDE=E", then why do the "DE" part?
: check Shannon's pure cipher for details.
相关阅读
请问这种hack程序如何清除?portscan 问题!HELP!病毒有谁知道这是什么原理?好伤心,那位大峡帮忙如何在office Small Business上加装Powerpoint?? antivirus software fro Windwos 2000 Server由于误操作不小心删除了数码相机compact flashcard内的照片,请问能否恢复(急!!!)???wireless router 安全吗?[转载] 250文件这是病毒么?气愤填膺IE主页被强行修改,可以这样改回 及 如何恢复注册表编辑已被禁用!请问什么地方有HTTPS/SSH/VPN/的实现细节[转载] re-enable Windows 2000 RPC如何进入bios设置哪儿有client-server的ssl程序sample?哪里能下载金山毒霸病毒库呀?Anyone know how to get server certificate through Web browser?疑问 - 硬盘占用空间不一致