Early unclassified symmetric-key block cipher
Factsheet
Factsheet
General
Designers IBM
First published 1975 (Federal Register) (standardized in January 1977)
Wikipedia
Data Encryption Standard - Wikipedia
2 weeks ago - In January 1999, distributed.net ... theoretical weaknesses in the cipher, although they are infeasible in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks....
Encryptionconsulting
Why 3DES Or Triple DES Is Officially Being Retired?
May 8, 2024 - The Data Encryption Standard, also known as DES, is no longer considered secure. While there are no known severe weaknesses in its internals, it is inherently flawed because its 56-bit key is too short.
tls - Is Triple DES still considered safe to use? - Cryptography Stack Exchange
tls - Is Triple DES still considered safe to use? - Cryptography Stack Exchange
However, Triple DES has a really ... the security of the system thanks to "block collision". This attack led to the removal of Triple DES from the DEFAULT cipher list in the 1.1.0 release of OpenSSL. The attack can also be mitigated by rekeying after a given amount of encrypted data. As a consequence of that, Triple DES was still in the TLS1.2 standard, but has not made it into the TLS1.3 one. So in the end, Triple DES is still considered secure if ... More on crypto.stackexchange.com
Is DES encryption secure?
Is DES encryption secure?
Short version: Uhh, not ‘99; way before. I was present at DES’ official death in 1993, but earlier, in the late ‘80s, I’d heard of an even-earlier succesful crack against DES.
I’ve long had an affection for DES. I started learning crypto back when DES was the state of the art, so I’ve worked a bit with it. I studied DES’ S-boxes quite closely, and I once had to fix a bug in the DES library call for the DEC version of 4.3 BSD UNIX.
BTW, when you look closely at DES’ design, a surprising bit of elegance appears. It turns out that the cipher’s mysterious & clunky pre- & post-processing steps cancel each other out, so that when we compose DES with itself, as in 3-DES, the composed clunky steps in the middle just disappear, leaving an uninterrupted 48-round Feistel network, with a very tidy key-schedule. Presumably, this served to allow DES’ formal cryptanalysis to extend naturally to 3DES.
I have two stories about breaking DES:
I was present on the night DES died, at the Crypto ’93 conference in Santa Barbara. On Wednesday night of that week, I went to the Rump Session, where Weiner presented his hardware design for a cheap-enough, fast-enough exhaustive search engine, for finding DES keys.
The rump session was for authors whose papers had almost been accepted for the conference. They each had just 10 minutes in which to present. The annual Crypto ‘XX conference is really a math conference, so we expected everyone in the room, presenters and audience, to be a mathematician, but Weiner didn’t get that memo.
Maybe twenty or thirty of us were crammed into a tiny, dimly-lit lecture room, sitting on random chairs, both hard and soft, plus a small sofa. There was a beer keg, and we drank our beer from small, flimsy, clear-plastic water cups.
When Weiner stood up and put his first slide on the overhead projector, he said at the outset that he was a hardware engineer. So, expecting uninformed foolshness, I and some others turned to look back to the door, thinking to leave and freshen up our beers. But, the back of the room was crowded, standing room only, and I didn’t want to lose my seat, so I decided to grit my teeth for the 10 minutes and stay. The other doubters stayed, too.
Weiner was a young guy like me, maybe in his early thirties. IIRC, he had short, dark, curly hair, and was clean-shaven. He spoke very quickly about a custom, high-speed DES chip, how much it would cost in bulk, how many of them he could fit on an 18″ circuit board, and how many such boards would fit in a standard 6-foot rack. Ho-hum, where’s my beer?
He showed us circuit diagrams, chip layouts on the boards, and how tightly the boards could fit in the rack. He talked about the power supply, and about how many fans would be needed to dump the chips’ heat. His slides had very little math or crypto notation.
But then, finally, he put up a slide with some math, showing his statistical calculation of the box’ reliability. He took into account the mean time between failure (MTBF) for the custom LSI chips, the support components, the power supply.
The math was easy to follow, and with that he suddenly had us, with his thoroughness; our skepticism and apathy fell away. The cost of the box was to be $1M, and the key-extraction time was to be just a few hours.
In that hot, crowded liitle room, full of sweaty cryptographers and beer cups, the atmosphere suddenly became electric. With the MTBF calculation, we all knew Weiner was right, DES was dead, and that we had witnessed its death. Over 20 years, DES had withstood fifty man-years of professional cryptanalytic effort, more than any other cipher. But we were there to see DES fall.
I left the rump session that night exhilarated, dazed, and sad. I understood DES’ internals pretty well, and I had come to like it, despite its odd quirks. I still like it now, but 3DES is just too slow for modern use, and it’s fatally vulnerable to memory-timing attacks. But DES was the first cipher I learned well.
Second DES story, as promised: A few years earlier, in the late ‘80s when I was working at MIT on my upgrades to the Kerberos protocol, my officemate Bob was an IBM engineer, on loan to us because IBM was one of the two corporate sponsors for our campus-networking project. Bob was about 10 years older than me.
Bob and I looked completely different: he was 6′4″ (190 cm), lanky, and impossibly handsome, with a big, square jaw, ruddy face, and an unruly thatch of thick, coarse brown hair. He always wore a jacket and tie, chinos, and well-polished loafers. I’ve never once seen Bob in blue jeans, never mind a T-shirt. He always looked as if he had just stepped out of a Ralph Lauren clothing ad.
By contrast, I was a hippie biker: tall and thin like Bob, but with a waist-length ponytail, a chest-length beard, and a jeweled gold tooth in the front of my mouth, from a misconceived street fight in the ghetto, ten years before. I only ever wore jeans and a T-shirt to work, with motorcycle boots on my feet and my scraped and battered bike jacket on my back.
But Bob and I got along well, because in college he had been a hippie like me, he rode a bike, and like me, he still swore like a sailor. Finally, he loved Hunter S. Thompson just as much as I did. When I named one of my research machines “drgonzo.athena.mit.edu”, Bob understood why and heartily approved.
So one day, Bob and I were drinking coffee and chatting at our desks in Building E-40. This being 1988 or 1989, DES was still sound, trusted, and in good standing as the symmetric-key cipher du jour. In fact, at that time DES was pretty much the only widely-used cipher for civilian work. We all were working on the Arpanet, which still was closed to everyone except researchers, and the Web hadn’t yet brought RSA into prominence.
I was describing something of my kerberos work to Bob, and somehow, DES came up. He said to me, “Lemme tell you a story about DES. I’m not sure i’m allowed to tell you this...” Bob leaned back in his desk chair, and through the window behind him, I could see down to the street level outside, where some students were walking in the summer sunshine along Wadsworth St. into Kendall Square.
He continued, with his big hands clasped behind his head. “A few years ago, after DES was developed at one of our research labs, some IBM researchers were experimenting one day with a newer cipher, bouncing encrypted packets off of an IBM network satellite, up in a geostationary orbit.
“After a couple days of this, they got a telephone call from the NSA. The NSA guy said, ‘We picked up some traffic from your satellite. You’re not using DES. Stop it.’ ”
Bob grinned widely, leaned back a bit farther in his chair, and waggled his shaggy eyebrows at me. “So maybe this kerberos stuff isn’t so airtight after all.”
Bob was fun to drink with, too.
1199 words.
My longer posts are here [ https://dondavislong.quora.com/ ]. More on quora.com
Is DES or 3DES still being used today? - Stack Overflow
Is DES or 3DES still being used today? - Stack Overflow
I'm voting to close this question as off-topic because it is not about programming. It might be more appropriate on Information Security. ... Triple-DES is still in use today but is widely considered a legacy encryption algorithm. More on stackoverflow.com
Is DES secure under CBC? - Cryptography Stack Exchange
Is DES secure under CBC? - Cryptography Stack Exchange
I know DES is outdated, but will is is secure in CBC mode? Can anyone help me understand why not? More on crypto.stackexchange.com
TechTarget
What is Data Encryption Standard (DES)? By
February 24, 2021 - DES was once the go-to, symmetric key algorithm for the encryption of electronic data, but it has been superseded by the more secure Advanced Encryption Standard (AES) algorithm. Some key features affecting how DES works include the following: Block cipher. The Data Encryption Standard is a ...
Freeswan
DES is Not Secure
DES, the Data Encryption Standard, can no longer be considered secure. While no major flaws in its innards are known, it is fundamentally inadequate because its 56-bit key is too short. It is vulnerable to brute-force search of the whole key space, either by large collections of general-purpose ...
Precisely
AES vs DES Encryption: Why AES has replaced DES, 3DES and TDEA
November 14, 2022 - AES on the other hand, uses permutation-substitution, which involves a series of substitution and permutation steps to create the encrypted block. The original DES designers made a great contribution to data security, but one could say that the aggregate effort of cryptographers for the AES ...
Simplilearn
DES (Data Encryption Standard): DES Algorithm and Operation
DES algorithm is a block cipher that transforms 64-bit plaintext into ciphertext through complex operations, ensuring data security with a fixed block size.
Published: 2 weeks ago
Address:
5851 Legacy Circle, 6th Floor, Plano, TX 75024 United States
Quora
Is Des obsolete? - Quora
April 20, 2020 - Answer: Theoretical attacks have been found in DES going as far back as 1992. In July 1998 DES was cracked in 56 hours and less than 6 months later a demonstrated attack cracked the key in under 24 hours using distributed computing. As of 2016, a single off the shelf Nvidia GeForce GTX 1080 Ti ca...
Quora
The DES encryption was broken in 1999. Why and how did it happen?
November 10, 2018 - Answer (1 of 6): Short version: Uhh, not ‘99; way before. I was present at DES’ official death in 1993, but earlier, in the late ‘80s, I’d heard of an even-earlier succesful crack against DES. I’ve long had an affection for DES. I started learning crypto back when DES was the state ...
Datadoghq
DES and Triple DES are now insecure
Weak security: The DES algorithm, which crypto/des implements, is considered weak and outdated. It uses a 56-bit key size, which is now vulnerable to brute-force attacks.
Businesstechweekly
Understanding the Data Encryption Standard (DES) - Businesstec...
May 11, 2023 - Despite being widely used for many ... led to vulnerabilities being discovered in DES, making it no longer considered secure by modern standards. Having gained an understanding of how DES works, it is important to examine its strengths and weaknesses....
Ituonline
What Is Data Encryption Standard (DES)? - ITU Online IT Training
June 26, 2024 - Government Communications: Securing sensitive government data and communications. Commercial Applications: Ensuring data integrity and confidentiality in various commercial software and hardware systems. While DES was groundbreaking in its time, it has significant limitations that led to its eventual replacement: Key Length: The 56-bit key length is now considered ...
Umsl
HISTORY OF DES
This is contrasted to a stream ... a byte) is encrypted. DES was the result of a research project set up by International Business Machines (IBM) corporation in the late 1960s which resulted in a cipher known as LUCIFER. In the early 1970s it was decided to commercialise LUCIFER and a number of significant changes were introduced. IBM was not the only one involved in these changes as they sought technical advice from the National Security Agency (NSA) ...
IBM
What is DES and AES?
We cannot provide a description for this page right now
SDxCentral
What is the Data Encryption Standard (DES)? - SDxCentral
November 8, 2022 - The Data Encryption Standard (DES) is a standard that uses a symmetric key method to encrypt and decrypt data. Both parties must have the same private key.
Comparitech
What is 3DES encryption and how does DES work? | Comparitech
August 31, 2023 - While keying option one is still considered secure for many applications, there aren’t many good reasons for why it should be used instead of an alternative like AES. Although 3DES holds an important place in cryptography as the follow-up to DES, its glory years are over and it’s time to ...
InfoSec Insights
DES vs AES: Everything to Know About AES 256 and DES Encryption ...
November 20, 2020 - DES vs AES — understanding the difference can be tricky. We'll break it all down into layman's terms & walk you through how each encryption method works.