DES-EDE3-CFB8 ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

The DES-EDE3-CFB8 algorithm is a symmetric-key block cipher configuration utilizing the Triple Data Encryption Standard (Triple DES) in Cipher Feedback (CFB) mode with an 8-bit feedback size. It operates on 64-bit data blocks and employs a sequence of three independent DES operations to enhance security beyond the original DES standard. This mode converts the block cipher into a stream cipher, allowing encryption and decryption of data in units smaller than the block size.

Key Structure and Management

DES-EDE3-CFB8 uses three distinct 56-bit DES keys, combined internally to form a 168-bit effective key. The encryption process performs encryption with the first key, decryption with the second key, and encryption with the third key. This approach ensures resistance against known cryptanalytic attacks that target single DES implementations. Key scheduling is handled according to DES specifications, generating 16 round keys per DES instance from each 56-bit key.

Encryption Process

The CFB8 mode operates by first initializing an initialization vector (IV) of 64 bits, which is combined with the plaintext through XOR operations. The algorithm processes data byte-by-byte, using the most significant 8 bits of the DES output as the feedback for the next operation. For each byte, the following steps occur:

  • The 64-bit shift register is encrypted using Triple DES in EDE mode.
  • The most significant 8 bits of the output are extracted.
  • These 8 bits are XORed with the plaintext byte to produce the ciphertext byte.
  • The shift register is updated by shifting left 8 bits and appending the ciphertext byte.

Decryption Process

Decryption mirrors the encryption steps. The ciphertext byte is XORed with the output of Triple DES applied to the shift register to recover the plaintext byte. The shift register update uses the ciphertext byte, maintaining alignment with encryption operations. This byte-oriented mode allows partial block encryption and decryption without padding requirements.

Security Considerations

DES-EDE3-CFB8 provides enhanced security compared to single DES due to triple application of the DES algorithm. The CFB8 mode ensures that data changes propagate throughout subsequent bytes, offering resistance to certain attack vectors. However, security depends critically on the uniqueness and secrecy of the keys and the initialization vector. Reuse of IVs with the same key combination can compromise confidentiality.

Performance Characteristics

Since DES-EDE3-CFB8 operates on bytes rather than full blocks, encryption and decryption can begin before the complete message is available. This feature is advantageous in streaming applications where latency is critical. Performance is influenced by the computational overhead of three DES operations per byte and the need for precise shift register management.