{"id":2716,"date":"2021-12-15T15:59:30","date_gmt":"2021-12-15T15:59:30","guid":{"rendered":"https:\/\/sectigostore.com\/blog\/?p=2716"},"modified":"2021-12-15T15:59:31","modified_gmt":"2021-12-15T15:59:31","slug":"what-is-des-encryption-a-look-at-the-des-algorithm","status":"publish","type":"post","link":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/","title":{"rendered":"What Is DES Encryption? A Look at the DES Algorithm"},"content":{"rendered":"\n<h2 class=\"wp-block-heading\">The data encryption standard (DES) was endorsed by the National Security Agency (NSA) from 1974 to 2002. For around 30 years, the DES algorithm ruled the cryptography world as the go-to encryption algorithm. But what is DES encryption exactly, and what were the reasons behind its discontinuation?<\/h2>\n\n\n\n<p>What is DES encryption? In a nutshell, the data encryption standard a type of encryption cipher, meaning a way to disguise information from unauthorized parties. If we think about the most basic form of cipher, we might think of the \u201csecret\u201d conversation two parents have by spelling out words they don\u2019t want their child to hear. Unfortunately for parents, as their child becomes older, the code stops working. One day, bam! The kid knows how to spell \u201cC-H-O-C-O-L-A-T-E.\u201d The secret code no longer serves its purpose.<\/p>\n\n\n\n<p>Something very similar has happened in the cryptography space. In times past, the data encryption standard was used to encrypt online communication. Nowadays, it has fallen out of use due to technological developments making it an increasingly insecure encryption method.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Is the DES Algorithm? A Definition of DES Encryption<\/h2>\n\n\n\n<p>So, what is DES? The data encryption standard, or DES, is an encryption algorithm that converts plaintext into blocks then uses a key to convert it to ciphertext. DES is based on an earlier cipher by cryptographer Horst Feistel, called <a href=\"https:\/\/www.ibm.com\/ibm\/history\/ibm100\/us\/en\/icons\/cryptography\/\">Lucifer<\/a>. Developed in the 1970s, Lucifer was one of the earliest <a href=\"https:\/\/www.tutorialspoint.com\/cryptography\/block_cipher.htm\">block ciphers<\/a>.<\/p>\n\n\n\n<p>DES is a symmetric algorithm, meaning that it uses a single key both to encrypt and decrypt communications and other data. This is different from asymmetric encryption, which uses two unique keys to encrypt (public key) and decrypt (private key) data and communications.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Why Is It Important to Learn About DES?<\/h2>\n\n\n\n<p>You might be wondering why you should learn about DES if it\u2019s already obsolete. Well, although it\u2019s true that the DES algorithm is no longer used for security purposes, it is still the basis for other security algorithms. So, learning what DES encryption is and how it works will also benefit your cybersecurity knowledge and understanding of cryptography as well. As such, your knowledge of DES will help you understand how other encryption algorithms work.<\/p>\n\n\n\n<p>So, let\u2019s learn about DES in some detail.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How Does DES Work? A Look at the Data Encryption Standard Process<\/h2>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"alignright size-full is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-a-block-cipher-work.png\" alt=\"A basic visual diagram that shows how DES works as a block cipher by breaking a plaintext input down into 64-bit blocks and encrypting it using a 56-bit key with 8 additional parity bits.\" class=\"wp-image-2717\" width=\"530\" height=\"709\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-a-block-cipher-work.png 743w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-a-block-cipher-work-224x300.png 224w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-a-block-cipher-work-560x748.png 560w\" sizes=\"auto, (max-width: 530px) 100vw, 530px\" \/><figcaption>An basic look at how DES as a block cipher works by breaking your input down into 64-bit blocks and encrypting each block using a 56-bit key + 8 parity bits.<\/figcaption><\/figure><\/div>\n\n\n\n<p>The basis of DES is bits, that is, binary numbers \u2014 i.e., 0s and 1s. Hexadecimal, or base 16 numbers, are made up of four bits. To encrypt a message, the data encryption standard:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Creates blocks of 16 hexadecimal numbers (equal to 64 bits) using an encryption key.<\/li><li>Encrypts 64 bits of plaintext (blocks) and returns 64 bits of ciphertext.<\/li><li>Performs 16 rounds of processing using Feistel function (more on it later),<\/li><li>Fortifies the encryption with additional initial and final permutations<\/li><\/ul>\n\n\n\n<p>The initial length of the key is 64 bits. However, every eighth bit is dropped, effectively making it a 56-bit key. Before being dropped, these eight bits, known as parity bits, are used to check the two versions of the message and detect errors in the code.<\/p>\n\n\n\n<p>So, with DES a message is divided into blocks of 64 bits. One problem with this is that not all messages have a length exactly divisible by 64, so the last block might be smaller than 64 bits. This means that the last part of the message has to be padded with extra bits to fill the space. There are different methods of padding the messages. One method is to use 0s at the end of the message to fill the gap and the numbers are then removed upon decryption.<\/p>\n\n\n\n<p>A figurative representation of how a block cipher encryption works<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DES Encryption Is a Six-Step Process<\/h3>\n\n\n\n<p>Now that we know what this block cipher method of encryption is, let\u2019s quickly break down how DES encryption works:<\/p>\n\n\n\n<ol class=\"wp-block-list\" type=\"1\"><li>The message is divided into 64-bit blocks.<\/li><li>An initial <a href=\"https:\/\/www.tutorialspoint.com\/cryptography\/data_encryption_standard.htm\">permutation<\/a> is carried out on the plain text blocks.<\/li><li>Permuted blocks are divided into two halves, each of which is 32 bits \u2013 left plain text (LPT) and right plain text (RPT).<\/li><li>Both LPT and RPT go through 16 rounds of encryption. Each round of encryption has five steps:<\/li><\/ol>\n\n\n\n<ul class=\"wp-block-list\" type=\"1\"><li><strong>Key transformation<\/strong> \u2014 Key transformation is a process wherein 16 different subkeys measuring 48-bits each are derived from the main key to encrypt plaintext. The key schedule is used to derive these keys. The following video explains the key schedule in detail:<\/li><\/ul>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"DES - Part 1 - The Key Schedule Algorithm of the Data Encryption Standard\" width=\"940\" height=\"529\" src=\"https:\/\/www.youtube.com\/embed\/HNOuv_9M6mI?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>Expansion permutation<\/strong> \u2014 A half-block of 32-bits is expanded to 48 bits using expansion permutation. It adds adjacent bits from each side of the block to the 32-bits of the block to create a 48-bit block.<\/li><li><strong>S-Box permutation<\/strong> \u2014 A substitution box permutation, or S-box, is the only non-linear component in the DES algorithm. It provides additional security to the cipher. After the block is mixed with the subkey, it is divided into eight 6-bit parts. The S-box process uses a lookup table to convert the eight 6-bit parts into 4-bit output each, resulting in 32-bit output in total.<\/li><li><strong>P-Box permutation<\/strong> \u2014 The 32-bit output from the S-box permutation is rearranged according to the P-box permutation. The design of the P-box permutation ensures that the output of each S-box is spread across four different S-boxes for the next round of encryption.<\/li><li><strong>ExclusiveOR (XOR) and swap<\/strong> \u2014 XOR is a mathematical function that compares two sets of bits that can be either 1s or 0s. If the bits from both sets match, the XOR output is 0. On the other hand, if they don\u2019t match, the output is 1. This bit-wise comparison results in stronger encryption, and XORing is something we\u2019ll speak more about in our next article on how DES encryption works.<\/li><\/ul>\n\n\n\n<ol class=\"wp-block-list\" start=\"5\"><li>LPT and RPT are combined.<\/li><li>The final permutation is performed on the combined LPT and RPT, resulting in the final ciphertext.<\/li><\/ol>\n\n\n\n<figure class=\"wp-block-image size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"753\" height=\"1024\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-des-encryption-work-753x1024.png\" alt=\"A visual diagram that takes a more in-depth look at the DES encryption process, which includes the use of initial permutation, 16 rounds, and the final permutation.\" class=\"wp-image-2718\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-des-encryption-work-753x1024.png 753w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-des-encryption-work-221x300.png 221w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-des-encryption-work-560x762.png 560w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/how-does-des-encryption-work.png 774w\" sizes=\"auto, (max-width: 753px) 100vw, 753px\" \/><figcaption> A visual representation of DES encryption with a more technical breakdown of how it works. <\/figcaption><\/figure>\n\n\n\n<p>So, that\u2019s how you get a ciphertext using DES. But how are the messages decrypted?<\/p>\n\n\n\n<p>Well, as we know, DES is a symmetric encryption algorithm. Therefore, the very key that is used to encrypt your plaintext data can also be used to decrypt it. In a basic sense, decryption requires the same steps as encryption but runs through them in reverse order.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">DES vs Triple DES (3DES)<\/h3>\n\n\n\n<p>Triple DES (TDES or 3DES) is another encryption algorithm that involves using DES three times to encrypt a text. While DES encrypts a block of data in 16 rounds, 3DES uses 48 rounds. Although it is a little stronger than DES, 3DES has proven to be ineffective in securing transmissions. Because 3DES is vulnerable to brute force attacks, the National Institute of Standards and Technology (<a href=\"https:\/\/csrc.nist.gov\/CSRC\/media\/Publications\/sp\/800-131a\/rev-2\/draft\/documents\/sp800-131Ar2-draft.pdf\">NIST<\/a>) has officially disallowed the use of 3DES after 2023. It seems the cryptography world has moved on to AES.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The 4 DES Modes of Operation<\/h2>\n\n\n\n<p>Being a block cipher algorithm, DES has several modes of operation, some of which start with initialization vectors (IVs) that help eliminate predictable patterns. Some of the most well-known modes of DES operation are as follows:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">1. Electronic Codebook (ECB) Mode<\/h3>\n\n\n\n<p>ECB is the simplest operation mode of all block ciphers. It\u2019s used to encrypt data one block at a time. The first block is encrypted, then the second block, and so on until the last block is encrypted. All blocks are encrypted using the same key \u2014 no other variable is used.<\/p>\n\n\n\n<p>When ECB is used in the same plaintext multiple times, it will result in the same ciphertext making it pretty easy to crack. This weakness can result in <a href=\"https:\/\/cheapsslsecurity.com\/blog\/what-is-a-man-in-the-middle-attack-mitm-explained\/\">man in the middle<\/a> and brute force attacks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"897\" height=\"479\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-ecb-mode.png\" alt=\"A basic diagram that illustrates how DES encryption works in ECB mode.\" class=\"wp-image-2719\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-ecb-mode.png 897w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-ecb-mode-300x160.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-ecb-mode-560x299.png 560w\" sizes=\"auto, (max-width: 897px) 100vw, 897px\" \/><\/figure>\n\n\n\n<p>A graphical representation of the ECB mode of operation in DES encryption.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">2. Cipher Block Chaining (CBC) Mode<\/h3>\n\n\n\n<p>Cipher block chaining is an operational mode that involves incorporating data from the previous block into each new block. CBC mode uses an initial vector (IV) in addition to the symmetric encryption key to encrypt data.<\/p>\n\n\n\n<p>The main feature of CBC is that it uses a chaining process while encrypting blocks, so the decryption of a particular block is dependent on the previous block. An <a href=\"https:\/\/www.geeksforgeeks.org\/xor-cipher\/\">XOR coding mechanism<\/a> is used in CBC to integrate the inputs. This prevents two identical blocks of plaintext from producing the same ciphertext.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"881\" height=\"500\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-cbc-mode.png\" alt=\"A basic diagram that illustrates how DES encryption works in ECB mode, which involves using an initial vector in addition to the encryption algorithm and key.\" class=\"wp-image-2720\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-cbc-mode.png 881w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-cbc-mode-300x170.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-cbc-mode-560x318.png 560w\" sizes=\"auto, (max-width: 881px) 100vw, 881px\" \/><\/figure>\n\n\n\n<p>A figure showing how DES encryption works using the CBC mode of operation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">3. Cipher Feedback (CFB) Mode<\/h3>\n\n\n\n<p>The <a href=\"https:\/\/www.ibm.com\/docs\/en\/zos\/2.4.0?topic=operation-cipher-feedback-cfb-mode\">cipher feedback mode<\/a> is a type of block cipher that uses segments instead of blocks to carry out feedback encryption to create pseudorandom bits. Each segment can range from one bit to the full block size specified by the algorithm you use (DES, AES, etc.).<\/p>\n\n\n\n<p>CFB mode uses an initial vector (IV) to start the encryption of the first data block. Each new input block uses the previous output block\u2019s ciphertext to encrypt the next block, which is a process known as feedback. The encryption algorithm generates the keystream that is placed in the bottom register. An XOR function is carried out between this keystream and the plaintext.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"928\" height=\"437\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-cfb-mode.png\" alt=\"A basic overview diagram that illustrates where the initial vector and plaintext come into play in the CFB mode of operation\" class=\"wp-image-2721\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-cfb-mode.png 928w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-cfb-mode-300x141.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-cfb-mode-560x264.png 560w\" sizes=\"auto, (max-width: 928px) 100vw, 928px\" \/><\/figure>\n\n\n\n<p>A simplified illustration of DES encryption using the CFB mode of operation.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">4. Output Feedback (OFB) Mode<\/h3>\n\n\n\n<p>OFB is similar in design to CFB mode but has some clear-cut differences. The output of CFB mode is further encrypted with a key to generate the ciphertext. The key is generated through an internal mechanism independent of the plaintext and the ciphertext. This results in different ciphertexts for identical blocks.<\/p>\n\n\n\n<figure class=\"wp-block-image size-full\"><img loading=\"lazy\" decoding=\"async\" width=\"824\" height=\"390\" src=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-ofb-mode.png\" alt=\"A basic overview diagram that illustrates where the initial vector and plaintext come into play in the CFB mode of operation\" class=\"wp-image-2722\" srcset=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-ofb-mode.png 824w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-ofb-mode-300x142.png 300w, https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/des-encryption-ofb-mode-560x265.png 560w\" sizes=\"auto, (max-width: 824px) 100vw, 824px\" \/><\/figure>\n\n\n\n<p>A simplified visual representation of DES encryption using the OFB mode of operation.<\/p>\n\n\n\n<p>If you want a more in-depth look at the different block cipher modes of operation, be sure to check out this article on <a href=\"https:\/\/www.thesslstore.com\/blog\/block-cipher-vs-stream-cipher\/\">block ciphers vs stream ciphers<\/a> that breaks all of that down.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What Makes DES a High-Risk Algorithm?<\/h2>\n\n\n\n<p>Don\u2019t worry if that last section had you scratching your head. It\u2019s not as important that you understand exactly how DES works in a more technical sense as it is that you realize that it\u2019s no longer a reliable method of data encryption in today\u2019s digital world. Let\u2019s explore why not.<\/p>\n\n\n\n<p>While DES was designed by IBM, the NSA played a significant role in its development. Although the NSA has historically <a href=\"https:\/\/gcn.com\/articles\/2011\/02\/16\/rsa-11-nsa--no-des-backdoor.aspx\">denied<\/a> that a backdoor be placed in the code, they admitted to requesting that the original 64-bit key be reduced to 48 bits. Eventually, a compromise was reached, and the 64-bit keys were reduced to 56 bits.<\/p>\n\n\n\n<p>The shorter key length was considered sufficient at the time, but as available computing power has increased over time, it\u2019s no longer strong enough. This increase in computing power means DES is susceptible to brute-force attacks, where the cybercriminal applies every possible key until they find the right key. A 56-bit key can be cracked in 2<sup>56 <\/sup>attempts, which back in 2017 might have taken a year. Today, websites like <a href=\"https:\/\/crack.sh\/\">crack.sh<\/a> offer to crack 56-bit DES keys within 26 hours for a price.<\/p>\n\n\n\n<p>Block ciphers get much of their security from the <a href=\"https:\/\/sansorg.egnyte.com\/dl\/pn0169nySl\">s-box<\/a>, or substitution box. It\u2019s kind of complicated, but the s-box is where one value is replaced with another to produce the encrypted text. When you change the values in the s-box, the output changes. The method by which the DES s-boxes were generated was not made clear, and there has been much speculation about the possibility of them acting as <a href=\"https:\/\/searchsecurity.techtarget.com\/tip\/Locking-the-backdoor-Reducing-the-risk-of-unauthorized-system-access\">backdoor<\/a>s for the NSA. Despite repeated denials by the NSA about these claims, the debate continues.<\/p>\n\n\n\n<p>To conclude, the reasons behind the discontinuation of the DES encryption standard are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>Devices with improved processing capabilities were developed, thereby reducing the time for brute force attacks<\/li><li>DES cracking proved to be an intelligence challenge in the cyber community<\/li><li>Stronger encryption standards were developed, including Triple-DES<\/li><\/ul>\n\n\n\n<h2 class=\"wp-block-heading\">3 Methods Used to Crack DES Encryption<\/h2>\n\n\n\n<p>There are many ways to crack the DES encryption. Let\u2019s explore a few of them:<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Differential Cryptanalysis (DC)<\/h3>\n\n\n\n<p>In 1990, two cryptographers named Eli Biham and Adi Shamir (one of the namesakes of the RSA algorithm) independently discovered <a href=\"https:\/\/link.springer.com\/article\/10.1007\/BF00630563\">differential cryptanalysis (DC)<\/a>, a method to crack cipher codes. We say \u201cindependently\u201d because IBM and NSA had knowledge of DC previously (perhaps from the 1970s), but it was a well-guarded secret.<\/p>\n\n\n\n<p>When the two cryptographers discovered differential cryptanalysis and released an open publication, cracking the 16 rounds of DES encryption became possible for the amateur cryptographer for the first time. As such, DES had to be redesigned to withstand DC attacks.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Linear Cryptanalysis<\/h3>\n\n\n\n<p>In 1993, Japanese cryptographer Mitsuru Matsui discovered that DES was susceptible to <a href=\"https:\/\/link.springer.com\/referenceworkentry\/10.1007%2F0-387-23483-7_233\">linear cryptanalysis<\/a>. Linear cryptanalysis is a plaintext attack where a cybercriminal uses something known as <a href=\"https:\/\/link.springer.com\/referenceworkentry\/10.1007%2F978-1-4419-5906-5_589\">probabilistic linear relations<\/a> between parity bits of the plaintext, the ciphertext, and the secret key to try to figure out the secret key\u2019s parity bits.<\/p>\n\n\n\n<p>You see, the parity bits of the key can be guessed if the probability of the approximation is high. When the attacker successfully approximates parity bits in the key, they can crack the DES code.<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Davies\u2019 Attack<\/h3>\n\n\n\n<p><a href=\"https:\/\/paginas.fe.up.pt\/~ei10109\/ca\/des-vulnerabilities.html\">Donald Davies<\/a> designed a technique in the 1980s to crack DES, which was further improved by Biham and Biryukov in 1997. <a href=\"https:\/\/link.springer.com\/article\/10.1007\/s001459900027\">The improved attack<\/a> has a 51% success rate and is faster than a brute force attack. Translation: an attacker has more chances to crack DES encryption through improved Davies\u2019 attack than by using either differential cryptanalysis or linear cryptanalysis.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">The DES Timeline<\/h2>\n\n\n\n<p>The main events that took place during the lifetime of DES are as follows:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>1973-74:<\/strong> The DES algorithm is developed by IBM.<\/li><li><strong>1974: <\/strong>The NSA adopts DES as a government-wide standard for encryption.<\/li><li><strong>1976:<\/strong> DES is approved in the United States as a federal standard.<\/li><li><strong>1983, 1988, 1993, and 1999:<\/strong> Federal approval is reaffirmed by the NSA.<\/li><li><strong>1999: <\/strong>The more secure triple DES algorithm is recommended by NIST.<\/li><li><strong>2005:<\/strong> NIST withdraws affirmation of DES. However, Triple DES is given confirmation for sensitive government information.<\/li><\/ul>\n\n\n\n<p>Meanwhile, in 2002, the more secure advanced encryption standard (AES) was becoming the algorithm of choice.<\/p>\n\n\n\n<p>In the 70s and 80s, DES was considered to be a strong encryption standard. But, like when children learn their parents\u2019 secret spelling codes, people eventually learn how to crack more complex codes. As DES was used by the U.S. government and had a stamp of approval from the NSA, it was under scrutiny from many people in the security world. Many cryptography challenges were initiated to test the security of DES, including public competitions where competitors were invited to crack the code and decrypt a message as quickly as possible.<\/p>\n\n\n\n<p>Four public competitions sealed the fate of DES:<\/p>\n\n\n\n<ul class=\"wp-block-list\"><li><strong>DES I (1997)<\/strong>: It took the <a href=\"https:\/\/amp.en.google-info.in\/18473453\/1\/deschall-project.html\">DESCHALL Project<\/a> 96 days to crack the code and decrypt the message using brute force.<\/li><li><strong>DES II-1 (1998)<\/strong>: <a href=\"https:\/\/www.wired.com\/1998\/02\/rsa-encryption-challenge-met\/\">Distributed.net<\/a> took 39 days to decrypt the message.<\/li><li><strong>DES II-2 (1998): <\/strong>This time, the<a href=\"https:\/\/www.wired.com\/1998\/12\/rsa-crack-des-in-a-day\/\">Electronic Frontier Foundation (EFF) cracked the code<\/a> in just 56 hours.<\/li><li><strong>DES III (1999)<\/strong>: Finally, a joint effort between <a href=\"https:\/\/www.distributed.net\/DES\">distributed.net and the EFF<\/a> cracked DES in less than a day \u2014 22 hours, 15 minutes to be precise.<\/li><\/ul>\n\n\n\n<p>After the competitions, the vulnerabilities in DES algorithm were revealed to all. Unbelievably, DES is still used sometimes even though it\u2019s long since been superseded by AES. So, if you\u2019re still using DES, it\u2019s time to bid it farewell!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What\u2019s Next for DES Encryption? Nothing Since You Should Now Be Using AES\u2026<\/h2>\n\n\n\n<p>In 1997, NIST declared that it was time to look for a replacement for DES. After a thorough evaluation, they selected the <a href=\"https:\/\/www.techtarget.com\/searchsecurity\/definition\/Rijndael\">Rijndael cipher<\/a>. After making a few changes to Rijndael, the advanced encryption standard (AES) came into being and was unveiled in 2001. <a href=\"https:\/\/www.thesslstore.com\/blog\/advanced-encryption-standard-aes-what-it-is-and-how-it-works\/\">AES<\/a> features key lengths of 128, 192, and 256 bits, and uses bigger blocks of 128 bits, which makes it a pretty reliable cipher. If you <a href=\"https:\/\/sectigostore.com\/blog\/des-vs-aes-everything-to-know-about-aes-256-and-des-encryption\/\">compare<\/a> DES and AES, you\u2019ll see that AES is far more secure than DES.<\/p>\n\n\n\n<p>With constant improvement in technical expertise and increased computer processing capabilities, it\u2019s inevitable that security algorithms become obsolete after a few years. Although there are no indications that AES-256 is vulnerable, it is probable that security enthusiasts will discover vulnerabilities in AES at some point in the future. However, it\u2019s vital that if you\u2019re still using DES, you <a href=\"https:\/\/docs.microsoft.com\/en-us\/services-hub\/health\/remediation-steps-ad\/remove-the-highly-insecure-des-encryption-from-user-accounts\">upgrade<\/a> your operating system and your user accounts immediately to the more secure AES.<\/p>\n\n\n\n<p><a href=\"https:\/\/quantum-computing.ibm.com\/composer\/docs\/iqx\/guide\/shors-algorithm\">Shor\u2019s algorithm<\/a> was discovered by an American mathematician Peter Shor. Under specific circumstances Shor\u2019s algorithm can crack public key cryptography algorithms like RSA, finite field Diffie-Hellman, and elliptic curve Diffie-Hellman using quantum computers. AES 256 is considered quantum resistant. The time taken to crack the algorithm, even with <a href=\"https:\/\/quantum-computing.ibm.com\/composer\/docs\/iqx\/guide\/shors-algorithm\">quantum computing<\/a>, is so long that it isn\u2019t practical to do so.<\/p>\n\n\n\n<p>AES 128 can be cracked within 2<sup>64 <\/sup>attempts, whereas AES 256 require 2<sup>128 <\/sup>attempts to crack. Although AES 128 is theoretically vulnerable to brute-force attacks, AES 256 coupled with a strong password is virtually unbeatable at this point because it would take too long and require too many resources to be feasible.<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts on the Data Encryption Standard (DES)<\/h2>\n\n\n\n<p>DES was a crucial encryption standard for many years and has played an important historical role in data security. However, with improvements in computing power and technical know-how, it eventually had to be replaced with the stronger AES algorithm.<\/p>\n\n\n\n<p>Encryption is a part of our online lives and understanding how it works helps us to stay secure. To learn more, read our next article on the subject where we explore the intricacies of how DES works.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The data encryption standard (DES) was endorsed by the National Security Agency (NSA) from 1974 to 2002. For around 30 years, the DES algorithm ruled the cryptography world as the&#8230;<\/p>\n","protected":false},"author":19,"featured_media":2727,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":"","tve_updated_post":"","tve_custom_css":"","tve_user_custom_css":"","tve_globals":{},"tcb2_ready":0,"tcb_editor_enabled":0,"tve_landing_page":"","_tve_header":"","_tve_footer":""},"categories":[9],"tags":[220,75,63],"class_list":["post-2716","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-encryption","tag-data-encryption-standard","tag-des","tag-symmetric-encryption","post-with-tags"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>What Is DES Encryption? A Look at the DES Algorithm - InfoSec Insights<\/title>\n<meta name=\"description\" content=\"What is DES Encryption? The data encryption standard is a symmetric algorithm block cipher that breaks data into blocks before encrypting it.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What Is DES Encryption? A Look at the DES Algorithm - InfoSec Insights\" \/>\n<meta property=\"og:description\" content=\"What is DES Encryption? The data encryption standard is a symmetric algorithm block cipher that breaks data into blocks before encrypting it.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/\" \/>\n<meta property=\"og:site_name\" content=\"InfoSec Insights\" \/>\n<meta property=\"article:published_time\" content=\"2021-12-15T15:59:30+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-12-15T15:59:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/what-is-des-encryption-feature-image.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1600\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Megha Thakkar\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Megha Thakkar\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/\"},\"author\":{\"name\":\"Megha Thakkar\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\"},\"headline\":\"What Is DES Encryption? A Look at the DES Algorithm\",\"datePublished\":\"2021-12-15T15:59:30+00:00\",\"dateModified\":\"2021-12-15T15:59:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/\"},\"wordCount\":2904,\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/what-is-des-encryption-feature-image.jpg\",\"keywords\":[\"Data Encryption Standard\",\"DES\",\"symmetric encryption\"],\"articleSection\":[\"Encryption\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/\",\"name\":\"What Is DES Encryption? A Look at the DES Algorithm - InfoSec Insights\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/what-is-des-encryption-feature-image.jpg\",\"datePublished\":\"2021-12-15T15:59:30+00:00\",\"dateModified\":\"2021-12-15T15:59:31+00:00\",\"author\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\"},\"description\":\"What is DES Encryption? The data encryption standard is a symmetric algorithm block cipher that breaks data into blocks before encrypting it.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/what-is-des-encryption-feature-image.jpg\",\"contentUrl\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/what-is-des-encryption-feature-image.jpg\",\"width\":1600,\"height\":1000,\"caption\":\"The feature image for the graphic \\\"What Is DES Encryption? A Look at the DES Algorithm\\\" which is an article that explores the Data Encryption Standard\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/what-is-des-encryption-a-look-at-the-des-algorithm\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"What Is DES Encryption? A Look at the DES Algorithm\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/\",\"name\":\"InfoSec Insights\",\"description\":\"SectigoStore.com Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/sectigostore.com\\\/blog\\\/#\\\/schema\\\/person\\\/77f01ec498571464bae513fa5bfd42da\",\"name\":\"Megha Thakkar\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g\",\"caption\":\"Megha Thakkar\"},\"description\":\"Megha can usually be found reading, writing, or watching documentaries, guaranteed to bore her family. She is a techno-freak with interests ranging from cooking to travel. A regular contributor to various web security blogs, she has earned her diploma in network-centric computing. Being a mother has taught her to speak less and write more (coz who listens to moms, right?).\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What Is DES Encryption? A Look at the DES Algorithm - InfoSec Insights","description":"What is DES Encryption? The data encryption standard is a symmetric algorithm block cipher that breaks data into blocks before encrypting it.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/","og_locale":"en_US","og_type":"article","og_title":"What Is DES Encryption? A Look at the DES Algorithm - InfoSec Insights","og_description":"What is DES Encryption? The data encryption standard is a symmetric algorithm block cipher that breaks data into blocks before encrypting it.","og_url":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/","og_site_name":"InfoSec Insights","article_published_time":"2021-12-15T15:59:30+00:00","article_modified_time":"2021-12-15T15:59:31+00:00","og_image":[{"width":1600,"height":1000,"url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/what-is-des-encryption-feature-image.jpg","type":"image\/jpeg"}],"author":"Megha Thakkar","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Megha Thakkar","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/#article","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/"},"author":{"name":"Megha Thakkar","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da"},"headline":"What Is DES Encryption? A Look at the DES Algorithm","datePublished":"2021-12-15T15:59:30+00:00","dateModified":"2021-12-15T15:59:31+00:00","mainEntityOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/"},"wordCount":2904,"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/what-is-des-encryption-feature-image.jpg","keywords":["Data Encryption Standard","DES","symmetric encryption"],"articleSection":["Encryption"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/","url":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/","name":"What Is DES Encryption? A Look at the DES Algorithm - InfoSec Insights","isPartOf":{"@id":"https:\/\/sectigostore.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/#primaryimage"},"image":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/#primaryimage"},"thumbnailUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/what-is-des-encryption-feature-image.jpg","datePublished":"2021-12-15T15:59:30+00:00","dateModified":"2021-12-15T15:59:31+00:00","author":{"@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da"},"description":"What is DES Encryption? The data encryption standard is a symmetric algorithm block cipher that breaks data into blocks before encrypting it.","breadcrumb":{"@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/#primaryimage","url":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/what-is-des-encryption-feature-image.jpg","contentUrl":"https:\/\/sectigostore.com\/blog\/wp-content\/uploads\/2021\/12\/what-is-des-encryption-feature-image.jpg","width":1600,"height":1000,"caption":"The feature image for the graphic \"What Is DES Encryption? A Look at the DES Algorithm\" which is an article that explores the Data Encryption Standard"},{"@type":"BreadcrumbList","@id":"https:\/\/sectigostore.com\/blog\/what-is-des-encryption-a-look-at-the-des-algorithm\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sectigostore.com\/blog\/"},{"@type":"ListItem","position":2,"name":"What Is DES Encryption? A Look at the DES Algorithm"}]},{"@type":"WebSite","@id":"https:\/\/sectigostore.com\/blog\/#website","url":"https:\/\/sectigostore.com\/blog\/","name":"InfoSec Insights","description":"SectigoStore.com Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sectigostore.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/sectigostore.com\/blog\/#\/schema\/person\/77f01ec498571464bae513fa5bfd42da","name":"Megha Thakkar","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/390ac6e8c0915150ea845acfc11db159571a2dc74d5745edc8edacec9f996bce?s=96&d=mm&r=g","caption":"Megha Thakkar"},"description":"Megha can usually be found reading, writing, or watching documentaries, guaranteed to bore her family. She is a techno-freak with interests ranging from cooking to travel. A regular contributor to various web security blogs, she has earned her diploma in network-centric computing. Being a mother has taught her to speak less and write more (coz who listens to moms, right?)."}]}},"_links":{"self":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2716","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/users\/19"}],"replies":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/comments?post=2716"}],"version-history":[{"count":0,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/posts\/2716\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media\/2727"}],"wp:attachment":[{"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/media?parent=2716"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/categories?post=2716"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sectigostore.com\/blog\/wp-json\/wp\/v2\/tags?post=2716"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}