Nicolas Roumiantzeff wrote:
> 
> Could you describe this "meet-in-the-middle" attack on the 3-DES?

OK, well, it's a known-plaintext attack. You encrypt the known plaintext
with all 2^56 possible keys for the first step, and store the results.
You then decrypt the ciphertext with all 2^112 possible keys for the
last two steps and compare to your stored results.

Cheers,

Ben.

--
http://www.apache-ssl.org/ben.html

"My grandfather once told me that there are two kinds of people: those
who work and those who take the credit. He told me to try to be in the
first group; there was less competition there."
     - Indira Gandhi
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to