Exploits Against Legacy Encryption – A Conversation with Cisco

Home > Blogs > Cisco > Exploits Against Legacy Encryption – A Conversation with Cisco

Exploits Against Legacy Encryption – A Conversation with Cisco

Like This Blog 1 Mike Danseglio
Added by April 4, 2013

You should already realize that you cannot just change your standard encryption algorithms and key lengths on a moment’s notice. Those are decisions that you made after careful research and testing. So while you might have some cryptography in place that isn’t the latest and greatest Elliptic Curve or Quantum Cryptography fad, you’re confident that it adequately protects your assets.

Or at least you selected cryptography that protected against known attacks when you selected it. And that’s the problem. Attackers never stop looking for exploits, be they weaknesses in the algorithm, attackable key sizes, or using Moore’s Law to simply brute force the math.

At the RSA Conference I had the pleasure of discussing a new type of possible attack against legacy encryption with Cisco Fellow David McGrew. He explains the potential weakness of 64-bit block ciphers including the American Data Encryption Standard (DES) and Triple-DES algorithms as well as the Soviet GOST 28147-89.

David and I we discuss the potential attacks as well as the fact that Triple-DES, or 3DES, is actually a 168-bit block cipher that uses three iterations of DES. Because 3DES is frequently used in IT today that topic is especially interesting. In fact, if your infrastructure supports mobile platforms like Apple iOS or Google Android, you probably have 3DES implemented right now. That makes watching this video even more important for you.

Check out the video of myself with David McGrew.

Be well and be safe!

Mike Danseglio -CISSP / CEH
Interface Technical Training – Technical Director and Instructor

Videos You May Like

Cable Testers and How to Use them in Network Environments

0 459 0

This content is from our CompTIA Network + Video Certification Training Course. Start training today! In this video, CompTIA Network + instructor Rick Trader demonstrates how to use cable testers in network environments. Let’s look at some tools that we can use to test our different cables in our environment. Cable Testers Properly Wired Connectivity … Continue reading Cable Testers and How to Use them in Network Environments

Agile Methodology in Project Management

0 172 0

In this video, you will gain an understanding of Agile and Scrum Master Certification terminologies and concepts to help you make better decisions in your Project Management capabilities. Whether you’re a developer looking to obtain an Agile or Scrum Master Certification, or you’re a Project Manager/Product Owner who is attempting to get your product or … Continue reading Agile Methodology in Project Management

Creating Users and Managing Passwords in Microsoft Office 365

0 752 4

In this Office 365 training video, instructor Spike Xavier demonstrates how to create users and manage passwords in Office 365.   For instructor-led Office 365 training classes, see our course schedulle: Spike Xavier SharePoint Instructor – Interface Technical Training Phoenix, AZ 20347: Enabling and Managing Office 365    

Write a Comment

See what people are saying...

    Share your thoughts...

    Please fill out the comment form below to post a reply.