
As early as 1979, IBM realized that the DES key length was too short and devised a way to
effectively increase it, using triple encryption (Tuchman, 1979). The method chosen, which has
since been incorporated in International Standard 8732, is illustrated in
Fig. 8-8. Here two
keys and three stages are used. In the first stage, the plaintext is encrypted using DES in the
usual way with
K
1
. In the second stage, DES is run in decryption mode, using K
2
as the key.
Finally, another DES encryption is done with
K
1
.
Figure 8-8. (a) Triple encryption using DES. (b) Decryption.
This design immediately gives rise to two questions. First, why are only two keys used, instead
of three? Second, why is
EDE (Encrypt Decrypt Encrypt) used, instead of EEE (Encrypt
Encrypt Encrypt
)? The reason that two keys are used is that even the most paranoid
cryptographers believe that 112 bits is adequate for routine commercial applications for the
time being. (And among cryptographers, paranoia is considered a feature, not a bug.) Going to
168 bits would just add the unnecessary overhead of managing and transporting another key
for little real gain.
The reason for encrypting, decrypting, and then encrypting again is backward compatibility
with existing single-key DES systems. Both the encryption and decryption functions are
mappings between sets of 64-bit numbers. From a cryptographic point of view, the two
mappings are equally strong. By using EDE, however, instead of EEE, a computer using triple
encryption can speak to one using single encryption by just setting
K
1
= K
2
. This property
allows triple encryption to be phased in gradually, something of no concern to academic
cryptographers, but of considerable importance to IBM and its customers.
8.2.2 AES—The Advanced Encryption Standard
As DES began approaching the end of its useful life, even with triple DES, NIST (National
Institute of Standards and Technology
), the agency of the U.S. Dept. of Commerce
charged with approving standards for the U.S. Federal Government, decided that the
government needed a new cryptographic standard for unclassified use. NIST was keenly aware
of all the controversy surrounding DES and well knew that if it just announced a new standard,
everyone knowing anything about cryptography would automatically assume that NSA had
built a back door into it so NSA could read everything encrypted with it. Under these
conditions, probably no one would use the standard and it would most likely die a quiet death.
So NIST took a surprisingly different approach for a government bureaucracy: it sponsored a
cryptographic bake-off (contest). In January 1997, researchers from all over the world were
invited to submit proposals for a new standard, to be called
AES (Advanced Encryption
Standard
). The bake-off rules were:
1. The algorithm must be a symmetric block cipher.
2. The full design must be public.
3. Key lengths of 128, 192, and 256 bits must be supported.
4. Both software and hardware implementations must be possible.
5. The algorithm must be public or licensed on nondiscriminatory terms.
Fifteen serious proposals were made, and public conferences were organized in which they
were presented and attendees were actively encouraged to find flaws in all of them. In August
1998, NIST selected five finalists primarily on the basis of their security, efficiency, simplicity,
flexibility, and memory requirements (important for embedded systems). More conferences