The Triple DES (3DES) encryption algorithm applies the insecure Data Encryption Standard (DES) to information three different times in an attempt to improve the security of the encryption process. In this video, learn how 3DES applies the DES algorithm to achieve an acceptable level of data security.
- View Offline
- [Instructor] When researchers discovered a tax on DES…that rendered the decades-old algorithm insecure,…security professionals faced a dilemma.…They had tons of old equipment, designed to work with DES…but were no longer able to rely upon its security.…While the government worked to adopt…the new advanced encryption standard, AES,…which I'll cover in the next video,…practical security professionals around the world…discovered a work-around.…By using the DES algorithm on the same text multiple times,…they could achieve greater security.…
Specifically, three rounds of DES encryption…produces much stronger security…than existed with standard DES.…They called this approach Triple DES.…Sometimes written as 3DES.…Here's how Triple DES works.…The person encrypting a message…feeds it in to the DES algorithm using the first key, K1.…This produces cipher text encrypted…with the standard DES algorithm.…
The sender of the message then takes this output…and feeds it in to the DES algorithm again.…This time, using key two,…
Members who take all eight courses in the series will be prepared to take and pass the CISSP exam. Find the companion study books at the Sybex test prep site and review the complete CISSP Body of Knowledge at https://www.isc2.org/cissp-domains/default.aspx.
- Understanding security and evaluation models
- Cloud computing and virtualization
- Securing hardware
- Client and server vulnerabilities
- Web security vulnerabilities
- Securing mobile and smart devices
- Understanding encryption
- Key management and public key infrastructure
- Physical security
Skill Level Advanced
Essentials of Cryptography and Network Securitywith Lisa Bock1h 45m Intermediate
CISSP Cert Prep: 2 Asset Securitywith Mike Chapple58m 11s Advanced
1. Security Engineering
2. Cloud Computing and Virtualization
3. Hardware Security
4. Client and Server Vulnerabilities
5. Web Security
6. Mobile Security
7. Smart Device Security
9. Symmetric Cryptography
10. Asymmetric Cryptography
11. Key Management
12. Public Key Infrastructure
13. Cryptanalytic Attacks
14. Physical Security
- Mark as unwatched
- Mark all as unwatched
Are you sure you want to mark all the videos in this course as unwatched?
This will not affect your course history, your reports, or your certificates of completion for this course.Cancel
Take notes with your new membership!
Type in the entry box, then click Enter to save your note.
1:30Press on any video thumbnail to jump immediately to the timecode shown.
Notes are saved with you account but can also be exported as plain text, MS Word, PDF, Google Doc, or Evernote.