• RSS
  • Twitter
  • FaceBook

Security Forums

Log in

FAQ | Search | Usergroups | Profile | Register | RSS | Posting Guidelines | Recent Posts

3DES vs DES vs Blowfish

Users browsing this topic:0 Security Fans, 0 Stealth Security Fans
Registered Security Fans: None
Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Cryptographic Theory and Cryptanalysis - Internal and Transmission Security

View previous topic :: View next topic  
Author Message
tajinvillage
Just Arrived
Just Arrived


Joined: 24 Mar 2008
Posts: 0


Offline

PostPosted: Tue Mar 25, 2008 2:08 am    Post subject: 3DES vs DES vs Blowfish Reply with quote

hi everyone,

here, i want to ask about the algorithms. among the algorithm which are more secure?is 3DES or blowfish is the most secure?? Question

in performance side, which are the fastest?compare the 3 algorithms..

hopefully you all can share with me your info... Smile
Back to top
View user's profile Send private message
Elderan
Just Arrived
Just Arrived


Joined: 08 Jun 2007
Posts: 0


Offline

PostPosted: Sun Mar 30, 2008 5:37 pm    Post subject: Reply with quote

Hi,
you shouldn't use DES, because you can just use a 56 bit key, which could be broken by brute force in a realistic time.
Also you shouldn't use 3DES, it's secure, but it is soooo slow, e.g. 3 times slower then normal DES.

The best choice in your list of algorithm would be blowfish, it's fast and secure, but you can also use AES, Twofish or other secure and fast algorithms.

Maybe Blowfish has a too short block size, just 64 bit, but this depends totaly on the purpose of use. For normal data encryption in CBC mode its okay (secure), but you shouldn't use Blowfish as a hash algorithm or as a stream cipher.
Back to top
View user's profile Send private message
tajinvillage
Just Arrived
Just Arrived


Joined: 24 Mar 2008
Posts: 0


Offline

PostPosted: Mon Mar 31, 2008 1:18 am    Post subject: Reply with quote

thanks Elderan,
for your info, now i working on file encryption system and i need to use all three algorithm in order to achieve my objective..
thanks again.
Back to top
View user's profile Send private message
JustinT
Trusted SF Member
Trusted SF Member


Joined: 17 Apr 2003
Posts: 16777215
Location: Asheville, NC, US / Uberlāndia, MG, Brazil

Offline

PostPosted: Tue Apr 01, 2008 6:03 am    Post subject: Objectives? Reply with quote

tajinvillage wrote:
thanks Elderan,
for your info, now i working on file encryption system and i need to use all three algorithm in order to achieve my objective..
thanks again.


What are your objectives, and which of them requires the implementation of DES, Triple-DES, and Blowfish? Backwards compatibility, perhaps? If you could lay all of your goals on the table for us to see, we could probably give you better advice. I'm not sure what your constraints are, but you the two primary goals you should go for are confidentiality (i.e., encryption) and integrity (i.e., authentication). More specifically, you want IND-CCA2 /\ INT-CTXT security, which represent the strongest notions of confidentiality and integrity for symmetric authenticated encryption schemes.

If you can, use the AES; it's receiving the most cryptanalytical attention of any block cipher. I can't think of a more compelling reason to suggest the use of a cryptographic primitive. It can be used in both encryption and authentication schemes; for example, by applying CMAC-AES to the ciphertext of AES-CTR, you get IND-CCA2 /\ INT-CTXT. The order of encrypt-then-authenticate is necessary for achieving these notions of security. By recycling the AES, you not only take advantage of its cryptanalysis-induced maturity, but you end up with a minimalist design.

Good cryptographic engineering is about mature and minimalist designs. Do a lot with a little. Less is more. Keep that in mind. I can't think of any cryptographic reasoning behind using DES, Triple-DES, and Blowfish, over the AES, so if there's nothing stopping you, transition to the AES and simplify your implementation. On the other hand, if you have environmental constraints that prevent the use of the AES, please let us know, so we can suggest a suitable alternative. However, for file encryption, I doubt this to be the case. I'm interested in hearing about your progress. Until then, cheers!
Back to top
View user's profile Send private message Visit poster's website
nonaniken
Just Arrived
Just Arrived


Joined: 27 Dec 2009
Posts: 0
Location: Indonesia

Offline

PostPosted: Sun Dec 27, 2009 3:18 pm    Post subject: Reply with quote

hi i'm newbie here and i'm glad to find this forum.. Smile

i've read the posting above and i think i have some similliar question related to 3des, AES ad blowfish.
here's my case, i'm doing my final project now, i make the voip implementation securing by IPSec. and for the IPSec algorithm, i compare 4 algorithms, which are 3DES-cbc, AES-cbc (Rijndael), Blowfish-cbc and ESP null encryption.
i've done the implementation, but don't done all yet. i haven't made the calculation among those algorithms.
here, i want to ask a brief explanation, which one from those algorithms is the best implemented in my project?
FYI, i use linux ubuntu for my project.
i reallly looking forward for the answer...

best regards
=niken=
Back to top
View user's profile Send private message Send e-mail Yahoo Messenger
Display posts from previous:   

Post new topic   Reply to topic   Printer-friendly version    Networking/Security Forums Index -> Cryptographic Theory and Cryptanalysis - Internal and Transmission Security All times are GMT + 2 Hours
Page 1 of 1


 
Jump to:  
You cannot post new topics in this forum
You cannot reply to topics in this forum
You cannot edit your posts in this forum
You cannot delete your posts in this forum
You cannot vote in polls in this forum

Community Area

Log in | Register