
DES uses 16 rounds of the Feistel structure, using a different key for each round.ĭES became the approved federal encryption standard in November 1976 and was subsequently reaffirmed as the standard in 1983, 1988, and 1999.ĭES’s dominance came to an end in 2002, when the Advanced Encryption Standard (AES) replaced the DES encryption algorithm as the accepted standard, following a public competition to find a replacement. History of DES AlgorithmĭES is based on the Feistel block cipher, called LUCIFER, developed in 1971 by IBM cryptography researcher Horst Feistel. If it were an asymmetrical algorithm, it would use different keys for encryption and decryption. Since it’s a symmetric-key algorithm, it employs the same key in both encrypting and decrypting the data. The algorithm takes the plain text in 64-bit blocks and converts them into ciphertext using 48-bit keys. The DES (Data Encryption Standard) algorithm is a symmetric-key block cipher created in the early 1970s by an IBM team and adopted by the National Institute of Standards and Technology (NIST).

What is the DES Algorithm in Cyber Security? Take a look at the video below which explains steps for encryption and decryption in detail, future of the Data Encryption Standard in cryptography and live example to further highlight the characteristics of DES encryption.Īfter having gone through and understanding what is DES, let us look into ways to improve our cybersecurity skills. For example, a 128-bit key requires 10 rounds, a 192-bit key requires 12 rounds, and so on. Depending upon the size of the key being used, the number of rounds varies. The DES process has several steps involved in it, where each step is called a round. Using this key, the DES takes a block of 64-bit plain text as input and generates a block of 64-bit cipher text. The DES algorithm uses a key of 56-bit size. There are certain machines that can be used to crack the DES algorithm.
