LLMpediaThe first transparent, open encyclopedia generated by LLMs

Data Encryption Standard

Generated by GPT-5-mini
Note: This article was automatically generated by a large language model (LLM) from purely parametric knowledge (no retrieval). It may contain inaccuracies or hallucinations. This encyclopedia is part of a research project currently under review.
Article Genealogy
Parent: CRYPTO Hop 4
Expansion Funnel Raw 100 → Dedup 0 → NER 0 → Enqueued 0
1. Extracted100
2. After dedup0 (None)
3. After NER0 ()
4. Enqueued0 ()
Data Encryption Standard
Data Encryption Standard
Hellisp · CC0 · source
NameData Encryption Standard
Release year1977
DesignersIBM; National Security Agency
Key size56 bits
Block size64 bits
StructureFeistel network
Rounds16
Replaced byAdvanced Encryption Standard

Data Encryption Standard is a symmetric-key Federal Information Processing Standards encryption algorithm standardized in 1977 and widely used for commercial and governmental electronic data protection. Originally developed from work at International Business Machines and influenced by interactions with the National Security Agency, the algorithm became central to cryptographic practices in the late 20th century and spurred extensive research by academics and agencies including Massachusetts Institute of Technology, University of California, Berkeley, Raytheon, and National Institute of Standards and Technology. Its publication prompted responses from figures and institutions such as Whitfield Diffie, Martin Hellman, Ron Rivest, IBM Research, and the U.S. Department of Commerce.

History

The origins trace to internal cipher research at International Business Machines where teams led by scientists associated with Horst Feistel and projects at IBM Research produced the prototype algorithm later submitted to the National Bureau of Standards (the precursor to National Institute of Standards and Technology). During review, the National Security Agency collaborated with the standards body, leading to controversial modifications that attracted critique from cryptographers at Stanford University, Massachusetts Institute of Technology, Bell Labs, and participants in conferences such as the CRYPTO and Eurocrypt series. Public debates involved commentators including Clifford Cocks, Adrian van Wijngaarden, and advocates for stronger export controls like representatives of the U.S. Department of State and the U.S. Congress. The 1970s and 1980s saw DES adopted across corporations such as AT&T, IBM, Microsoft Corporation, and American Express, and standardized in documents issued by Federal Information Processing Standards.

Design and algorithm

The cipher employs a 64-bit block cipher structure with 56 effective key bits after parity bits are removed, implemented as a 16-round Feistel network inspired by earlier work at IBM Research and building on principles from researchers affiliated with Harvard University and Princeton University. Core components include initial and final permutations, expansion functions, substitution via eight S-boxes, and permutation functions devised during interactions with the National Security Agency and vetted by cryptographers from institutions like Los Alamos National Laboratory and RAND Corporation. S-box design choices led to scrutiny from academics such as Morris Dworkin and practitioners from NIST and NSA, while later formalizations referenced methods developed at Cornell University and University of Waterloo. The key schedule produces round keys using rotations and compression permutations; this schedule was analyzed by teams at Bell Labs, Carnegie Mellon University, and University of California, Davis for strengths and weaknesses.

Security and cryptanalysis

Early confidence in the cipher was challenged by advances in cryptanalysis from researchers at Massachusetts Institute of Technology, SRI International, IBM Research, and Royal Holloway, University of London. Techniques such as differential cryptanalysis discovered by scientists linked to AT&T Bell Labs and the Philips Research group, as well as linear cryptanalysis developed by personnel associated with Nippon Telegraph and Telephone and École Polytechnique, exposed structural vulnerabilities in the S-boxes and key schedule. Practical attacks included brute-force key searches demonstrated by projects at Electronic Frontier Foundation and Cryptographic Research, Inc., alongside time–memory tradeoff work from Institut National de Recherche en Informatique et en Automatique researchers. Academic teams at University of California, Davis, Royal Holloway, and University of London produced papers on weak keys, complementation properties, and meet-in-the-middle attacks, while governments like United Kingdom and France funded empirical evaluations. The cumulative research motivated the cryptographic community at International Organization for Standardization and IEEE to advocate for successor algorithms.

Implementation and modes of operation

Implementations of the cipher were produced by vendors including IBM, Microsoft Corporation, Sun Microsystems, Oracle Corporation, Cisco Systems, and Fujitsu for hardware and software contexts. Standard modes of operation applied to the cipher encompassed Electronic Codebook, Cipher Block Chaining, Cipher Feedback, and Output Feedback modes as documented in standards and guides from National Institute of Standards and Technology, International Organization for Standardization, Internet Engineering Task Force, and American National Standards Institute. Hardware accelerators were built by firms like Intel Corporation, Motorola, and Xilinx; cryptanalytic hardware realizations came from laboratories at Lawrence Livermore National Laboratory and startup groups including Cryptographic Research, Inc.. Libraries and toolkits embedding the algorithm appeared in projects from OpenSSL Project, GNU Project, MIT Kerberos Consortium, and Pivotal Software, often with bindings to platforms such as Linux, Solaris, Windows NT, and FreeBSD.

Applications and usage

The algorithm saw deployment in banking systems at Visa, Mastercard, and national payments networks, in telecommunications equipment by Nokia and Ericsson, and in government systems for datasets managed by agencies like Internal Revenue Service and Social Security Administration. It was integrated into network protocols standardized by Internet Engineering Task Force working groups, into smart card products by Giesecke+Devrient and Oberthur Technologies, and into secure messaging projects at AT&T and Motorola. Academic and industrial research labs—MIT Media Lab, Stanford Research Institute, and Bell Labs—used the cipher as a benchmark for new cryptanalytic methods and for education in courses at Massachusetts Institute of Technology, Stanford University, and Princeton University.

Legacy and replacement

Ongoing weaknesses led to the development and selection of the Advanced Encryption Standard through an open competition managed by National Institute of Standards and Technology, with finalists from Rijndael designers and teams at RSA Security, Counterpane Systems, and Eurocrypt contributors. The selection process involved evaluations by cryptographers at University of California, Berkeley, École Normale Supérieure, Royal Holloway, and Kryptologie researchers, culminating in the adoption of AES in 2001. The cipher's history influenced export-control debates involving the U.S. Department of State and cryptographic policy at institutions such as World Trade Organization discussions, and motivated creation of successor standards like Triple DES and numerous open-source cryptography toolkits maintained by groups including OpenSSL Project and Apache Software Foundation. Scholars at Harvard University, Yale University, and Columbia University continue to teach its design and cryptanalysis as part of computer security curricula, and museums and archives at Smithsonian Institution and Computer History Museum preserve related artifacts.

Category:Block ciphers