I posted this question on the CCCURE forums and wanted to share an excellent response from a member there detailing the question. This helped me out a lot. It went back and forth for quite a few, but I'm going to only include my initial post and the best answer. Also as I was reminded, do not dig deep into the concepts too much.
http://www.cccure.org/ftopicp-32896.html#32896The 3DES symmetric process works as follows:
Encrypt with the first key
Decrypt with the second key
Encrypt with the first key
I guess the thing that is throwing me off is how can you decrypt the ciphertext using a second key? My understanding of symmetric based private key implementations must use the same key to encrypt/decrypt.
So how can you decrypt with a second key when it was initially encrypted with the first (different)?
I agree that you probably do not need this for the test. However, let's go into an analogy, because I sometimes have difficulty understanding the basic process if I am caught up in more abstract issues. In the deciphering/decrypting process you would need to apply all the original keys.
Rather than a backup process, let's think about it this encryption process in terms of a letter. Let's do 3DES-EDE3, encrypt, decrypt, and encrypt with three different keys. The first encryption step is writting a letter (plaintext) and put it into a sealed standard envelope (first key). Now, you decrypt the letter with the an incorrect key (second key), or in this example you open the letter by ripping it in half instead of along the top. Then, in the third encryption process you put the ripped letter into a big shipping box (third key). In order to decrypt you cannot just open the original standard envelop. You have to reverse the packaging process by opening the shipping box, putting the two halves of the letter together, then opening the small envelop.