@@ -144,14 +144,16 @@ attack.
144144It turns out that it is not trivial to create cryptographic ciphers
145145that can be broken only by brute force. For example, the original DES
146146(data encryption standard) algorithm had a key of only 56 bits; when
147- it became clear that 56 bits was too small, triple DES was introduced, using three
148- rounds of DES each with its own key. It might seem that this
149- increased the key size to 168 bits (:math: `3 \times 56 `) but because
150- of the 3-round structure of triple DES, the attacker only has to
151- search a key space of 112 bits. This depends on something called a
152- "meet-in-the-middle attack". The details are not important here but it
153- illustrates why cryptographic algorithms need to be designed
154- carefully if they are not to contain surprising weaknesses.
147+ it became clear that 56 bits was too small, triple DES was introduced,
148+ using three rounds of DES each with its own key. It might seem that
149+ this increased the key size to 168 bits (:math: `3 \times 56 `) but
150+ because of the 3-round structure of triple DES, an attacker in
151+ possession of a piece of ciphertext and the matching plaintext only
152+ has to search a key space of 112 bits. This depends on something
153+ called a "meet-in-the-middle attack". The details are not important
154+ here but it illustrates why cryptographic algorithms need to be
155+ designed carefully and evaluated by experts if they are not to contain
156+ surprising weaknesses.
155157
156158Network security tends to focus on the security of data as it
157159moves through the network—that is, data that is vulnerable for only a
0 commit comments