The Data Encryption Standard (DES was designed by)
Up until recently, the main standard for encrypting data was a symmetric algorithm known as the Data Encryption Standard (DES). However, this has now been replaced by a new standard known as the Advanced Encryption Standard (AES) which we will look at later. DES is a 64 bit block cipher which means that it encrypts data 64 bits at a time. This is contrasted to a stream cipher in which only one bit at a time (or sometimes small groups of bits such as a byte) is encrypted. Show
DES was the result of a research project set up by International Business Machines (IBM) corporation in the late 1960�s which resulted in a cipher known as LUCIFER. In the early 1970�s it was decided to commercialise LUCIFER and a number of significant changes were introduced. IBM was not the only one involved in these changes as they sought technical advice from the National Security Agency (NSA) (other outside consultants were involved but it is likely that the NSA were the major contributors from a technical point of view). The altered version of LUCIFER was put forward as a proposal for the new national encryption standard requested by the National Bureau of Standards (NBS). It was finally adopted in 1977 as the Data Encryption Standard - DES (FIPS PUB 46). Some of the changes made to LUCIFER have been the subject of much controversy even to the present day. The most notable of these was the key size. LUCIFER used a key size of 128 bits however this was reduced to 56 bits for DES. Even though DES actually accepts a 64 bit key as input, the remaining eight bits are used for parity checking and have no effect on DES�s security. Outsiders were convinced that the 56 bit key was an easy target for a brute force attack due to its extremely small size. The need for the parity checking scheme was also questioned without satisfying answers Another controversial issue was that the S-boxes used were designed under classified conditions and no reasons for their particular design were ever given. This led people to assume that the NSA had introduced a �trapdoor� through which they could decrypt any data encrypted by DES even without knowledge of the key. One startling discovery was that the S-boxes appeared to be secure against an attack known as Differential Cryptanalysis which was only publicly discovered by Biham and Shamir in 1990. This suggests that the NSA were aware of this attack in 1977; 13 years earlier! In fact the DES designers claimed that the reason they never made the design specifications for the S-boxes available was that they knew about a number of attacks that weren�t public.knowledge at the time and they didn�t want them leaking - this is quite a plausible claim as differential cryptanalysis has shown. However, despite all this controversy, in 1994 NIST reformed DES for government use for a further five years for use in areas other than �classifed�. DES of course isn�t the only symmetric cipher. There are many others, each with varying levels of complexity. Such ciphers include: IDEA, RC4, RC5, RC6 and the new Advanced Encryption Standard (AES). AES is an important algorithm and was originally meant to replace DES (and its more secure variant triple DES) as the standard algorithm for non-classi?ed material. However as of 2003, AES with key sizes of 192 and 256 bits has been found to be secure enough to protect information up to top secret. Since its creation, AES had underdone intense scrutiny as one would expect for an algorithm that is to be used as the standard. To date it has withstood all attacks but the search is still on and it remains to be seen whether or not this will last. We will look at AES later in the course. The DES Algorithm is a block cipher. It uses symmetric keys to convert 64-bit plaintext blocks into 48-bit ciphertext blocks. The DES Algorithm was developed by the IBM team in the 1970s. It has since been accepted by the National Institute of Standards and Technology (NSIT). The DES encryption algorithm uses symmetric keys, which means that the same key is used for encrypting and decrypting the data. Get 100% Hike! Master Most in Demand Skills Now ! Triple DES AlgorithmTriple DES is a block cipher that applies the DES algorithm thrice. It usually uses three different keys—k1, k2, and k3. The first key, k1, is used to encrypt, the second key, k2, is used to decrypt, and the third key, k3, is used to encrypt again. The triple DES also has a variant that uses only two keys, where k1 and k3 are the same. DES Algorithm StepsLet us take a look at the steps involved in the DES algorithm:
In the encryption process (step 4), there are five stages:
In the decryption process, the same algorithm is used with the order of the 16 keys reversed. Check out this Cybersecurity Tutorial to learn Cybersecurity Essentials! DES Modes of OperationThe following are the different DES modes of operation to choose from:
DES Algorithm ImplementationYou need a security provider to implement the DES algorithm. There are many providers that are available in the market, and it is crucial to select one as the first step of the implementation process. The provider you select will depend on the language being used by you. This can be MATLAB, C, Python, or Java. Once you have selected the provider, you have to decide how the key is going to be generated. You can have the key randomly generated by the key generator or you can create a key on your own. You can use either plaintext or a byte array for this purpose. It is crucial to test the encryption so you can be assured of its proper implementation. Want to get an Advanced Certification in Cybersecurity? Enroll today! Applications of DES AlgorithmThe DES algorithm is used whenever a not-very-strong encryption is needed. It can be used in random number generators or even as a permutation generator. One of the most important practical applications of the DES algorithm is to create triple DES legacy systems with three keys. Difference Between AES and DES AlgorithmsAES and DES are both symmetric ciphers. So, what is the difference between them? Let us find out. ParameterAESDESMeaningAES stands for advanced encryption standard.DES stands for data encryption standard.Key LengthThe key length can be 128 bits, 192 bits, or 256 bits.The key length is 56 bits.Rounds of OperationsThe rounds of operations per key length are as follows: 128 bits: 10 192 bits: 12 256 bits: 14There are 16 identical rounds of operations.NetworkAES is based on a substitution and permutation network.DES is based on the Feistel network.SecurityAES is considered the standard encryption algorithm in the world and is more secure than DES.DES is considered to be a weak encryption algorithm; triple DES is a more secure encryption algorithm.RoundsKey Addition, Mix Column, Byte Substitution, and Shift Row.Substitution, XOR Operation, Permutation, and Expansion.SizeAES can encrypt plaintext of 128 bits.DES can encrypt plaintext of 64 bits.Derived fromAES was derived from the Square Cipher.DES was derived from the Lucifer Cipher.Designed byAES was designed by Vincent Rijmen and Joan Daemen.DES was designed by IBM.Known AttacksThere are no known attacks for AES.Brute force attacks, differential cryptanalysis, and linear cryptanalysis.Learn Ethical Hacking from MNIT faculty! Enroll today! Advantages and Disadvantages of DES AlgorithmLet us take a look at the advantages and disadvantages of the DES Algorithm. Advantages of DES AlgorithmThe advantages are as follows:
Disadvantages of DES AlgorithmThe disadvantages are as follows:
ConclusionDES is a symmetric block cipher that can be used to encrypt 64-bits of plaintext into 64-bits of ciphertext. The algorithm is the same for the process of encryption as well as decryption. The only difference is that the decryption procedure is the opposite of the encryption procedure. The algorithm goes through 16 rounds and makes it stronger. Now, even though there are much stronger encryption algorithms available, learning about DES is still important as it helped in the advancement of cryptography as we know it today. Who designed the DES?Data Encryption Standard. Who is the inventor of DES encryption?In DES, it is invented by eminent scholar and researcher Horst Feistel at IBM. It supports large security by utilizing a 128-bit key block and a 128-bit block size. The DES algorithm need the 16 rounds of the Feistel structure.
Who developed the DES standards used in EDI?DES (Data Encryption Standard) Definition
92. It uses 16 round Feistel structure and the block size is 64-bit. Data encryption algorithm represents an improvement of the Lucifer algorithm that was developed in the early 1970s by IBM.
What is Data Encryption Standard DES )? Mcq?What is data encryption standard (DES)? Explanation: DES is a symmetric key block cipher in which the block size is 64 bits and the key size is 64 bits. It is vulnerable to some attacks and is hence not that popularly used. Take Computer Networks Practice Tests - Chapterwise!
|