Differences between version 8 and previous revision of DES.
Other diffs: Previous Major Revision, Previous Author, or view the Annotated Edit History
Newer page: | version 8 | Last edited on Thursday, October 7, 2004 3:48:46 pm | by PerryLorier | Revert |
Older page: | version 6 | Last edited on Sunday, July 4, 2004 10:09:20 pm | by StuartYeates | Revert |
@@ -1,14 +1,13 @@
[Acronym] for __D__ata __E__ncryption __S__tandard
-A very widely used and widely studied encryption algorithm, now being gradually replaced
by [AES
]. There are a number of variants, including [3DES].
+A very widely used and widely studied encryption algorithm. It was designed
by a team at
[IBM] under guidance from the [NSA] and standardized by the [NIST
]. There are a number of variants, including [3DES]. Its designated successor is [AES
].
-The workings
of the algorithm are explained: http:
//www.tropsoft
.com/strongenc/des.htm and the official page
at the [NIST
]: http://www
.itl.nist
.gov/fipspubs/fip46-2
.htm
+An [NSA] recommendation that [DES] implementations shouldn't use certain parts
of the keyspace led to a lot of controversy about whether a backdoor
/flaw that allowed [NSA] to break [DES] encrypted messages existed
. A new attack on ciphers found after [DES] being in use for about 30 years was successful against almost all ciphers
at the time, including
[DES
] for that the part of the keyspace
. Many believe that [NSA] knew about this attack (30 years before everyone else!) and "fixed" [DES] to be safe against it
. Take this little story with a grain of salt and use your tin foil hat
.
-[DES] is to be replaced with
[AES
], it's successor.
-
-The "Standard" part of the name is because DES is/was an
[NIST]
standard and thus used by many US government agencies, and therefore also by many companies
.
-
-[DES
] was designed by people
at [IBM
] with help from the
[NSA]. A lot
of controversy about how the [NSA] had placed a back door
/flaw in [DES] so they could decrypt all messages that were encrypted with [DES]
. (The NSA had recommended that DES implementations don't use certain parts of the keyspace)
. After about 30 years of [DES] being used a new attack on ciphers was found which almost all ciphers at
the time fell to, including that part
of the [DES] keyspace
. It is believed that the [NSA
] probably knew about this attack (30 years before everyone else!) and "fixed" [DES] so that it was safe against it. Anyway, take this little story with a grain of salt, and put on your tin foil hat next time you're outdoors.
+See also:
+*
[DES Overview | http://www.tropsoft.com/strongenc/des.htm
] explains how
[DES
] works
+*
[Official
standard definition | http://www
.itl.nist.gov/fipspubs/fip46-2.htm
] at [NIST
]
+*
[Bruce Schneier's The Legacy
of DES | http:
//www
.schneier
.com/blog/archives/2004/10/
the_legacy_
of_d
.html
]
----
CategoryCryptography