Penguin

Differences between version 8 and predecessor to the previous major change of DES.

Other diffs: Previous Revision, Previous Author, or view the Annotated Edit History

Newer page: version 8 Last edited on Thursday, October 7, 2004 3:48:46 pm by PerryLorier Revert
Older page: version 6 Last edited on Sunday, July 4, 2004 10:09:20 pm by StuartYeates Revert
@@ -1,14 +1,13 @@
 [Acronym] for __D__ata __E__ncryption __S__tandard 
  
-A very widely used and widely studied encryption algorithm, now being gradually replaced by [AES ]. There are a number of variants, including [3DES]. 
+A very widely used and widely studied encryption algorithm. It was designed by a team at [IBM] under guidance from the [NSA] and standardized by the [NIST ]. There are a number of variants, including [3DES]. Its designated successor is [AES ]. 
  
-The workings of the algorithm are explained: http: //www.tropsoft .com/strongenc/des.htm and the official page at the [NIST ]: http://www .itl.nist .gov/fipspubs/fip46-2 .htm  
+An [NSA] recommendation that [DES] implementations shouldn't use certain parts of the keyspace led to a lot of controversy about whether a backdoor /flaw that allowed [NSA] to break [DES] encrypted messages existed . A new attack on ciphers found after [DES] being in use for about 30 years was successful against almost all ciphers at the time, including [DES ] for that the part of the keyspace . Many believe that [NSA] knew about this attack (30 years before everyone else!) and "fixed" [DES] to be safe against it . Take this little story with a grain of salt and use your tin foil hat
  
-[DES] is to be replaced with [AES ], it's successor.  
-  
-The "Standard" part of the name is because DES is/was an [NIST] standard and thus used by many US government agencies, and therefore also by many companies .  
-  
-[DES ] was designed by people at [IBM ] with help from the [NSA]. A lot of controversy about how the [NSA] had placed a back door /flaw in [DES] so they could decrypt all messages that were encrypted with [DES] . (The NSA had recommended that DES implementations don't use certain parts of the keyspace) . After about 30 years of [DES] being used a new attack on ciphers was found which almost all ciphers at the time fell to, including that part of the [DES] keyspace . It is believed that the [NSA ] probably knew about this attack (30 years before everyone else!) and "fixed" [DES] so that it was safe against it. Anyway, take this little story with a grain of salt, and put on your tin foil hat next time you're outdoors.  
+See also:  
+* [DES Overview | http://www.tropsoft.com/strongenc/des.htm ] explains how [DES ] works  
+* [Official standard definition | http://www .itl.nist.gov/fipspubs/fip46-2.htm ] at [NIST ]  
+* [Bruce Schneier's The Legacy of DES | http: //www .schneier .com/blog/archives/2004/10/ the_legacy_ of_d .html
  
 ---- 
 CategoryCryptography