Global Information Lookup Global Information

Data Encryption Standard information


Data Encryption Standard
The Feistel function (F function) of DES
General
DesignersIBM
First published1975 (Federal Register) (standardized in January 1977)
Derived fromLucifer
SuccessorsTriple DES, G-DES, DES-X, LOKI89, ICE
Cipher detail
Key sizes56 bits
Block sizes64 bits
StructureBalanced Feistel network
Rounds16
Best public cryptanalysis
DES has been considered unsecure right from the start because of the feasibility of brute-force attacks.[1] Such attacks have been demonstrated in practice (see EFF DES cracker) and are now available on the market as a service. As of 2008, the best analytical attack is linear cryptanalysis, which requires 243 known plaintexts and has a time complexity of 239–43 (Junod, 2001).

The Data Encryption Standard (DES /ˌdˌˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of 56 bits makes it too insecure for modern applications, it has been highly influential in the advancement of cryptography.

Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with the National Security Agency (NSA), the NBS selected a slightly modified version (strengthened against differential cryptanalysis, but weakened against brute-force attacks), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977.[2]

The publication of an NSA-approved encryption standard led to its quick international adoption and widespread academic scrutiny. Controversies arose from classified design elements, a relatively short key length of the symmetric-key block cipher design, and the involvement of the NSA, raising suspicions about a backdoor. The S-boxes that had prompted those suspicions were designed by the NSA to remove a backdoor they secretly knew (differential cryptanalysis). However, the NSA also ensured that the key size was drastically reduced so that they could break the cipher by brute force attack.[2] The intense academic scrutiny the algorithm received over time led to the modern understanding of block ciphers and their cryptanalysis.

DES is insecure due to the relatively short 56-bit key size. In January 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see § Chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. This cipher has been superseded by the Advanced Encryption Standard (AES). DES has been withdrawn as a standard by the National Institute of Standards and Technology.[3]

Some documents distinguish between the DES standard and its algorithm, referring to the algorithm as the DEA (Data Encryption Algorithm).

  1. ^ Cite error: The named reference dh-exh was invoked but never defined (see the help page).
  2. ^ a b "The Legacy of DES - Schneier on Security". www.schneier.com. October 6, 2004.
  3. ^ Cite error: The named reference Lazo was invoked but never defined (see the help page).

and 26 Related for: Data Encryption Standard information

Request time (Page generated in 0.8323 seconds.)

Data Encryption Standard

Last Update:

The Data Encryption Standard (DES /ˌdiːˌiːˈɛs, dɛz/) is a symmetric-key algorithm for the encryption of digital data. Although its short key length of...

Word Count : 6541

Advanced Encryption Standard

Last Update:

Advanced Encryption Standard (AES), also known by its original name Rijndael (Dutch pronunciation: [ˈrɛindaːl]), is a specification for the encryption of electronic...

Word Count : 5609

International Data Encryption Algorithm

Last Update:

cryptography, the International Data Encryption Algorithm (IDEA), originally called Improved Proposed Encryption Standard (IPES), is a symmetric-key block...

Word Count : 1499

Advanced Encryption Standard process

Last Update:

was markedly more open and transparent than its predecessor, the Data Encryption Standard (DES). This process won praise from the open cryptographic community...

Word Count : 1040

Triple DES

Last Update:

the DES cipher algorithm three times to each data block. The Data Encryption Standard's (DES) 56-bit key is no longer considered adequate in the face...

Word Count : 2906

Encryption

Last Update:

In cryptography, encryption is the process of encoding information. This process converts the original representation of the information, known as plaintext...

Word Count : 3575

Cryptography standards

Last Update:

attract a large amount of cryptanalysis. Data Encryption Standard (DES, now obsolete) Advanced Encryption Standard (AES) RSA the original public key algorithm...

Word Count : 498

Transparent data encryption

Last Update:

Transparent Data Encryption (often abbreviated to TDE) is a technology employed by Microsoft, IBM and Oracle to encrypt database files. TDE offers encryption at...

Word Count : 640

Homomorphic encryption

Last Update:

Homomorphic encryption is a form of encryption that allows computations to be performed on encrypted data without first having to decrypt it. The resulting...

Word Count : 4324

List of telecommunications encryption terms

Last Update:

Crypto-shredding Data Encryption Standard (DES) Decipher Decode Decrypt DECT Standard Cipher Descrambler Dncipher Encode Encoding law Encrypt End-to-end encryption group...

Word Count : 449

Pretty Good Privacy

Last Update:

Pretty Good Privacy (PGP) is an encryption program that provides cryptographic privacy and authentication for data communication. PGP is used for signing...

Word Count : 5724

National Security Agency

Last Update:

transparent process for replacing the outdated Data Encryption Standard (DES) by an Advanced Encryption Standard (AES). Cybersecurity policy expert Susan Landau...

Word Count : 22318

DES supplementary material

Last Update:

This article details the various tables referenced in the Data Encryption Standard (DES) block cipher. All bits and bytes are arranged in big endian order...

Word Count : 600

Email encryption

Last Update:

Email encryption is encryption of email messages to protect the content from being read by entities other than the intended recipients. Email encryption may...

Word Count : 1671

Crypto Wars

Last Update:

commercial encryption on the rapidly growing field of wired money transfer. The U.S. Government's introduction of the Data Encryption Standard in 1975 meant...

Word Count : 4062

List of important publications in cryptography

Last Update:

the original on 2003-12-04. Description: The RSA encryption method. The first public-key encryption method. Shamir, A. (November 1979). "How to share...

Word Count : 1198

Data security

Last Update:

cyberattack or a data breach. Disk encryption refers to encryption technology that encrypts data on a hard disk drive. Disk encryption typically takes...

Word Count : 1402

BitLocker

Last Update:

volume encryption feature included with Microsoft Windows versions starting with Windows Vista. It is designed to protect data by providing encryption for...

Word Count : 3309

Key size

Last Update:

cipher was selected in 1974 as the base for what would become the Data Encryption Standard. Lucifer's key length was reduced from 128 bits to 56 bits, which...

Word Count : 3205

JSON Web Encryption

Last Update:

JSON Web Encryption (JWE) is an IETF standard providing a standardised syntax for the exchange of encrypted data, based on JSON and Base64. It is defined...

Word Count : 284

Feistel cipher

Last Update:

including the US Data Encryption Standard, the Soviet/Russian GOST and the more recent Blowfish and Twofish ciphers. In a Feistel cipher, encryption and decryption...

Word Count : 1293

Differential cryptanalysis

Last Update:

ciphers and hash functions, including a theoretical weakness in the Data Encryption Standard (DES). It was noted by Biham and Shamir that DES was surprisingly...

Word Count : 1688

Cryptography

Last Update:

include the commonly used AES (Advanced Encryption Standard) which replaced the older DES (Data Encryption Standard). Insecure symmetric algorithms include...

Word Count : 10726

Disk encryption theory

Last Update:

Disk encryption is a special case of data at rest protection when the storage medium is a sector-addressable device (e.g., a hard disk). This article presents...

Word Count : 3504

Project 25

Last Update:

of Data Encryption Standard (DES) encryption (56 bit), 2-key Triple-DES encryption, three-key Triple-DES encryption, Advanced Encryption Standard (AES)...

Word Count : 4587

Disk encryption

Last Update:

unauthorized people or processes. Disk encryption uses disk encryption software or hardware to encrypt every bit of data that goes on a disk or disk volume...

Word Count : 2145

PDF Search Engine © AllGlobal.net