Generated by DeepSeek V3.2| Data Encryption Standard | |
|---|---|
| Name | Data Encryption Standard |
| Caption | The Feistel structure of the cipher |
| Designers | IBM |
| Publish date | 1977 |
| Derived from | Lucifer (cipher) |
| Derived to | Triple DES, GOST (block cipher), FEAL |
| Key size | 56 bits |
| Block size | 64 bits |
| Structure | Feistel network |
| Rounds | 16 |
| Cryptanalysis | Differential cryptanalysis demonstrated in 1990s; vulnerable to brute-force attack. |
Data Encryption Standard. It is a symmetric-key algorithm for the encryption of digital data, established as a Federal Information Processing Standard in the United States in 1977. Developed by an IBM team that included cryptographers like Horst Feistel and later modified with input from the National Security Agency, it became one of the most widely used encryption systems for over two decades. Its adoption by the U.S. government and financial institutions like ANSI and the American Bankers Association standardized electronic data protection during the rise of networked computing.
The cipher's origins trace to an IBM research project in the early 1970s, led by Horst Feistel, which produced the Lucifer (cipher). In 1973, the National Bureau of Standards, later renamed NIST, issued a public request for a cryptographic algorithm, prompting IBM to submit a modified version of Lucifer (cipher). The design was then reviewed and controversially altered by the National Security Agency, which sparked debates in Congress and among academics like Whitfield Diffie and Martin Hellman regarding potential backdoors. After public scrutiny and a workshop by the National Security Agency, it was formally adopted as a FIPS standard, published in the *Federal Register* in 1977.
The algorithm is a symmetric block cipher using a Feistel network structure, operating on 64-bit blocks of plaintext under a 56-bit key. The encryption process involves 16 rounds of complex transformations, each round utilizing a different 48-bit subkey derived from the main key via a key schedule. Core operations include expansion, substitution via non-linear S-boxes—a critical design element whose development involved the National Security Agency—and permutation. The decryption process is identical to encryption, simply reversing the order of the subkeys. This structure ensured efficient implementation in both hardware, such as chips from Intel, and software.
Concerns about its security emerged early, notably from Whitfield Diffie and Martin Hellman, who argued the 56-bit key length was vulnerable to a brute-force attack. Major cryptanalytic advances confirmed these fears; in 1990, Eli Biham and Adi Shamir publicly introduced differential cryptanalysis, a technique the National Security Agency was likely aware of during the design phase. The most public demonstration of its weakness was the DES Challenges organized by RSA Security, where a machine called Deep Crack built by the Electronic Frontier Foundation broke the cipher in 22 hours in 1999. These attacks, alongside theoretical ones like linear cryptanalysis developed by Mitsuru Matsui, rendered it obsolete for protecting sensitive data.
It was extensively implemented in hardware for high-speed applications, with certified integrated circuit chips produced by companies like Intel and Motorola. Its adoption as a standard by the ANSI as Data Encryption Algorithm and by the American Bankers Association for financial transactions cemented its use in automated teller machine networks and point of sale terminals. Software implementations were also common in early secure communication systems and within various U.S. Department of Defense projects. The algorithm's specification was incorporated into international standards by the International Organization for Standardization, facilitating its global use in commercial data security.
Its gradual retirement began with the publication of Triple DES, a more secure variant that applied the algorithm three times, adopted by NIST and used in systems like Microsoft Windows. In 1997, NIST initiated the process for a successor, culminating in the selection of the Rijndael cipher, developed by Joan Daemen and Vincent Rijmen, as the Advanced Encryption Standard in 2001. The final withdrawal of the standard as a FIPS was announced in 2005. Its historical significance is preserved in cryptographic education, the DES Challenges, and its influence on later ciphers like FEAL and the design principles of the Advanced Encryption Standard.
Category:Symmetric-key algorithms Category:Computer security standards Category:Computer-related introductions in 1977