CDMF

Source: Wikipedia, the free encyclopedia.

In

S-HTTP
.

Algorithm

Like DES, CDMF accepts a 64-bit input key, but not all bits are used. The algorithm consists of the following steps:

  1. Clear bits 8, 16, 24, 32, 40, 48, 56, 64 (ignoring these bits as DES does).
  2. XOR
    the result with its encryption under DES using the key 0xC408B0540BA1E0AE.
  3. Clear bits 1, 2, 3, 4, 8, 16, 17, 18, 19, 20, 24, 32, 33, 34, 35, 36, 40, 48, 49, 50, 51, 52, 56, 64.
  4. Encrypt the result under DES using the key 0xEF2C041CE6382FE6.

The resulting 64-bit data is to be used as a DES key. Due to step 3, a

brute force attack
needs to test only 240 possible keys.

References

  • D.B. Johnson; S.M. Matyas; A.V. Le; J.D. Wilkins (March 1994). "The Commercial Data Masking Facility (CDMF) data privacy algorithm" (. Retrieved April 11, 2007.
  • U.S. patent 5,323,464, IBM's patent on CDMF
  • ISO/IEC9979-0005 Register Entry (PDF), registered October 29, 1994
  • .
  • , defines S-HTTP


This page is based on the copyrighted Wikipedia article: CDMF. Articles is available under the CC BY-SA 3.0 license; additional terms may apply.Privacy Policy