DES3-WRAP ENCRYPTION TOOL

Other Crypto Algorithms

AES-128-CBC AES-128-CBC-CTS AES-128-CBC-HMAC-SHA1 AES-128-CBC-HMAC-SHA256 AES-128-CCM AES-128-CFB AES-128-CFB1 AES-128-CFB8 AES-128-CTR AES-128-ECB AES-128-GCM AES-128-GCM-SIV AES-128-OCB AES-128-OFB AES-128-SIV AES-128-WRAP AES-128-WRAP-INV AES-128-WRAP-PAD AES-128-WRAP-PAD-INV AES-128-XTS AES-192-CBC AES-192-CBC-CTS AES-192-CCM AES-192-CFB AES-192-CFB1 AES-192-CFB8 AES-192-CTR AES-192-ECB AES-192-GCM AES-192-GCM-SIV AES-192-OCB AES-192-OFB AES-192-SIV AES-192-WRAP AES-192-WRAP-INV AES-192-WRAP-PAD AES-192-WRAP-PAD-INV AES-256-CBC AES-256-CBC-CTS AES-256-CBC-HMAC-SHA1 AES-256-CBC-HMAC-SHA256 AES-256-CCM AES-256-CFB AES-256-CFB1 AES-256-CFB8 AES-256-CTR AES-256-ECB AES-256-GCM AES-256-GCM-SIV AES-256-OCB AES-256-OFB AES-256-SIV AES-256-WRAP AES-256-WRAP-INV AES-256-WRAP-PAD AES-256-WRAP-PAD-INV AES-256-XTS ARIA-128-CBC ARIA-128-CCM ARIA-128-CFB ARIA-128-CFB1 ARIA-128-CFB8 ARIA-128-CTR ARIA-128-ECB ARIA-128-GCM ARIA-128-OFB ARIA-192-CBC ARIA-192-CCM ARIA-192-CFB ARIA-192-CFB1 ARIA-192-CFB8 ARIA-192-CTR ARIA-192-ECB ARIA-192-GCM ARIA-192-OFB ARIA-256-CBC ARIA-256-CCM ARIA-256-CFB ARIA-256-CFB1 ARIA-256-CFB8 ARIA-256-CTR ARIA-256-ECB ARIA-256-GCM ARIA-256-OFB CAMELLIA-128-CBC CAMELLIA-128-CBC-CTS CAMELLIA-128-CFB CAMELLIA-128-CFB1 CAMELLIA-128-CFB8 CAMELLIA-128-CTR CAMELLIA-128-ECB CAMELLIA-128-OFB CAMELLIA-192-CBC CAMELLIA-192-CBC-CTS CAMELLIA-192-CFB CAMELLIA-192-CFB1 CAMELLIA-192-CFB8 CAMELLIA-192-CTR CAMELLIA-192-ECB CAMELLIA-192-OFB CAMELLIA-256-CBC CAMELLIA-256-CBC-CTS CAMELLIA-256-CFB CAMELLIA-256-CFB1 CAMELLIA-256-CFB8 CAMELLIA-256-CTR CAMELLIA-256-ECB CAMELLIA-256-OFB CHACHA20 CHACHA20-POLY1305 DES-EDE-CBC DES-EDE-CFB DES-EDE-ECB DES-EDE-OFB DES-EDE3-CBC DES-EDE3-CFB DES-EDE3-CFB1 DES-EDE3-CFB8 DES-EDE3-ECB DES-EDE3-OFB DES3-WRAP 

Key Components

The primary components of the DES3-WRAP algorithm include:

  • Input Key: The key material to be wrapped, typically ranging from 128 to 192 bits.
  • KEK (Key Encryption Key): The secret key used to perform the wrapping and unwrapping operations.
  • Initialization Vector (IV): A predefined 64-bit constant used in the initial step to provide randomness and prevent predictable outputs.
  • DES3 Engine: The cryptographic core performing three successive DES operations with applied keys.

Operational Steps

The wrapping procedure follows a structured sequence of transformations:

  1. Preparation: The input key is concatenated with a checksum value derived from its contents to provide integrity verification.
  2. Initial Encryption: The combined key and checksum are encrypted using the DES3 engine with the KEK in a standard encrypt-decrypt-encrypt sequence.
  3. Permutation: The output is reordered in a fixed pattern to prevent predictable structural patterns from being exposed.
  4. Secondary Encryption: The permuted data undergoes an additional DES3 encryption pass to produce the final wrapped key output.

Security Considerations

DES3-WRAP ensures that wrapped keys cannot be manipulated or exposed without knowledge of the KEK. The inclusion of a checksum and permutation stages allows detection of tampering during unwrapping. This algorithm is widely adopted in cryptographic modules and protocols that require key transport without revealing the plaintext key. It provides strong protection against differential and linear cryptanalysis inherent to DES by combining multiple encryption layers.

Applications

Typical applications of DES3-WRAP include secure distribution of symmetric keys in financial systems, hardware security modules, and secure communications protocols. It is particularly used in environments where backward compatibility with DES-based infrastructure is required while enhancing overall security through triple encryption and integrity checks.