Rev | Author | # | Line |
---|---|---|---|
8 | PerryLorier | 1 | [Acronym] for __D__ata __E__ncryption __S__tandard |
2 | |||
3 | A very widely used and widely studied encryption algorithm. It was designed by a team at [IBM] under guidance from the [NSA] and standardized by the [NIST]. There are a number of variants, including [3DES]. Its designated successor is [AES]. | ||
4 | |||
5 | An [NSA] recommendation that [DES] implementations shouldn't use certain parts of the keyspace led to a lot of controversy about whether a backdoor/flaw that allowed [NSA] to break [DES] encrypted messages existed. A new attack on ciphers found after [DES] being in use for about 30 years was successful against almost all ciphers at the time, including [DES] for that the part of the keyspace. Many believe that [NSA] knew about this attack (30 years before everyone else!) and "fixed" [DES] to be safe against it. Take this little story with a grain of salt and use your tin foil hat. | ||
6 | |||
7 | See also: | ||
8 | * [DES Overview | http://www.tropsoft.com/strongenc/des.htm] explains how [DES] works | ||
9 | * [Official standard definition | http://www.itl.nist.gov/fipspubs/fip46-2.htm] at [NIST] | ||
11 | AristotlePagaltzis | 10 | * BruceSchneier's [The Legacy of DES | http://www.schneier.com/blog/archives/2004/10/the_legacy_of_d.html] |
8 | PerryLorier | 11 | |
12 | ---- | ||
13 | CategoryCryptography |
lib/blame.php:177: Warning: Invalid argument supplied for foreach()