Groups | Search | Server Info | Login | Register


Groups > comp.security.pgp.tech > #64

Having a little challenge while trying to decrytp 3Des encrypted data.

X-Received by 10.46.5.203 with SMTP id 194mr755402ljf.11.1474302014506; Mon, 19 Sep 2016 09:20:14 -0700 (PDT)
X-Received by 10.25.211.205 with SMTP id k196mr169811lfg.9.1474302013948; Mon, 19 Sep 2016 09:20:13 -0700 (PDT)
Path csiph.com!feeder.erje.net!1.us.feeder.erje.net!newsfeed.fsmpi.rwth-aachen.de!newsfeed.straub-nv.de!proxad.net!feeder1-2.proxad.net!74.125.82.87.MISMATCH!k125no4153500wma.0!news-out.google.com!h131ni12767wmd.0!nntp.google.com!k125no4153451wma.0!postnews.google.com!glegroupsg2000goo.googlegroups.com!not-for-mail
Newsgroups comp.security.pgp.tech
Date Mon, 19 Sep 2016 09:20:12 -0700 (PDT)
Complaints-To groups-abuse@google.com
Injection-Info glegroupsg2000goo.googlegroups.com; posting-host=41.73.234.244; posting-account=PScjLgoAAADEVMddCVFOlJRkq6pMI4ET
NNTP-Posting-Host 41.73.234.244
User-Agent G2/1.0
MIME-Version 1.0
Message-ID <e1f8c1c3-e8c9-4646-9033-fdd72ef2efd7@googlegroups.com> (permalink)
Subject Having a little challenge while trying to decrytp 3Des encrypted data.
From derinlois1@gmail.com
Injection-Date Mon, 19 Sep 2016 16:20:14 +0000
Content-Type text/plain; charset=UTF-8
Content-Transfer-Encoding quoted-printable
Xref csiph.com comp.security.pgp.tech:64

Show key headers only | View raw


in the process of trying to decrypt an encrypted data, i am having a little challenge with it. I will be so glad if anyone can help putting me through.

Although, i have already studied the algorithm in carrying out this operation, since i am to get my data from a device, which already has its Base Derivation Key(BDK), Initially loaded key serial number and the initially loaded pin entry device key.

In the documentation that was been given, we have the Initially loaded key serial number, data encryption key variant and the track 2 Data (which is in plaintext). 

In this example, i was made to know that they actually used a 3DES-128 bits CBC Mode (padding zero) method.

and, the following are the data that was been used.

	Base Derivation Key (BDK): 				0123456789ABCDEFFEDCBA9876543210
	Initially Loaded Key Serial Number (KSN): 	FFFF9876543210E00000
	Initially Loaded PIN Entry Device Key: 		6AC292FAA1315B4D858AB3A3D7D5933A

Data Encryption key variant
Initially Loaded Key Serial Number (KSN): 	FFFF9876543210E00001
Data Encryption key variant: 			448D3F076D8304036A55A3D7E0055A78
Track 2 Data (Plaintext):					1234567890ABCDEFFEDCBA0987654321

(Encrypt by 3DES-128 bits CBC Mode (padding zero))
Track 2 Data (Encrypted):				D0911CD510047AC6AEE9CE8AFEDA9301


my question now is, how was the plaintext gotten from the encrypted data. I will be so glad, if anyone can put me through.

Although, this is what i have been able to do..trying to make use of this simple algorithm, but not getting it at all.

public String do3DESDecryption(String key, String text) {
        String decryptedInfo = null;
        try {
            String key1 = key.substring(0, 16);
            String key2 = key.substring(16);
            decryptedInfo = doDESDecryption(key1, text);
            decryptedInfo = doDESEncryption(key2, decryptedInfo);
            decryptedInfo = doDESDecryption(key1, decryptedInfo);
        } catch (Exception ex) {
            System.out.println("What's happening"+ex.getMessage());
            ex.printStackTrace();
        }

        return decryptedInfo;
    }

Back to comp.security.pgp.tech | Previous | Next | Find similar


Thread

Having a little challenge while trying to decrytp 3Des encrypted data. derinlois1@gmail.com - 2016-09-19 09:20 -0700

csiph-web