Generated by GPT-5-mini| DES | |
|---|---|
| Name | Data Encryption Standard |
| Introduced | 1977 |
| Designers | IBM; National Bureau of Standards; National Security Agency |
| Key size | 56 bits (effective) |
| Block size | 64 bits |
| Structure | Feistel network |
| Rounds | 16 |
| Derived from | Lucifer |
| Replaced by | Advanced Encryption Standard |
DES is a symmetric-key block cipher standardized in 1977 as a federal information processing standard. It was promulgated to provide confidentiality for electronic data and became widely adopted across industry, finance, and government. Over time practical cryptanalytic advances and increasing computational power demonstrated its limitations, prompting migration to stronger algorithms and standards.
The cipher originated from work at IBM in the early 1970s, evolving from an earlier cipher called Lucifer developed by Horst Feistel and colleagues. The National Bureau of Standards solicited a federal standard, and IBM submitted the algorithm that became standardized after review by the National Security Agency. The Federal Information Processing Standards publication in 1977 formalized adoption, triggering widespread deployment by companies such as AT&T, Mastercard, and Visa in financial networks. Academic researchers at institutions including MIT, Stanford University, and University of California, Berkeley later published influential analyses that challenged assumptions about the cipher's resilience.
The design employs a 16-round Feistel network operating on 64-bit blocks with a 56-bit effective key. Its structure uses initial and final permutations, expansion functions, key schedule permutations, and eight substitution boxes (S-boxes) derived from IBM designs. The S-boxes and the key schedule were subject to scrutiny by cryptographers at Bell Labs, RAND Corporation, and Massachusetts Institute of Technology, while the involvement of the National Security Agency led to debate over design rationale. The algorithm's internal operations are defined in bit-level permutations, XORs, and nonlinear S-box lookups facilitating confusion and diffusion as described in classical results by Claude Shannon.
Early academic attacks included differential cryptanalysis concepts later generalized by researchers at Boeing Computer Services and AT&T Bell Laboratories. Cryptanalytic milestones involved brute-force key search demonstrated by projects such as the Electronic Frontier Foundation's custom hardware and the concerted distributed effort by the University of Illinois and other universities. Techniques including linear cryptanalysis proposed by researchers at Mitsubishi Electric Research Laboratories and differential-linear hybrids refined understanding of practical weaknesses. Real-world compromises of systems using this cipher prompted security advisories from agencies like the National Institute of Standards and Technology and influenced cryptographic policy at the Department of Defense.
Implementations appeared across hardware and software platforms: mainframes from IBM, minicomputers from Digital Equipment Corporation, embedded systems by Motorola and Intel, and operating systems such as Unix variants and Microsoft Windows. Cryptographic libraries like OpenSSL, GnuPG, and Bouncy Castle provided software implementations, while network protocols—used by SWIFT, X.25 gateways, and early versions of IPsec—employed the cipher in modes such as ECB and CBC. Specialized hardware accelerators and smartcard deployments by firms like Gemplus facilitated secure payment and authentication in systems used by American Express and central banks.
To mitigate key-length limitations, researchers and vendors proposed variants including multiple-encryption constructions such as double and triple iterations. The triple construction standardized in various modes by industry consortia led to a Triple algorithm widely used until the selection of the successor standard. The search for a successor produced the Advanced Encryption Standard competition managed by NIST, culminating in the selection of an algorithm developed by cryptographers associated with Daemen and Rijmen and adopted as the federal standard. Other successor algorithms and block cipher families evaluated by standards bodies included designs submitted by teams from IBM Research and academic centers.
Export of cryptographic technology incorporating the cipher intersected with national security and trade policy. Legislative and regulatory frameworks at agencies such as the U.S. Department of Commerce and export control regimes like the Wassenaar Arrangement affected distribution of strong implementations. Litigation and policy debates involved civil liberties groups such as the Electronic Frontier Foundation and industry stakeholders including Microsoft Corporation and Sun Microsystems. Government procurement policies and international agreements influenced adoption and the allowed key lengths for exported products, while congressional hearings and advisory panels shaped long-term cryptographic policy.
Category:Block ciphers Category:Federal Information Processing Standards