Data Encryption Standard

GPTKB entity

Statements (53)
Predicate Object
gptkbp:instance_of gptkb:crypt
gptkbp:algorithm_family symmetric algorithms
gptkbp:block 64 bits
gptkbp:designed_for data confidentiality
gptkbp:developed_by gptkb:IBM
gptkbp:first_published gptkb:1977
gptkbp:has_programs Feistel network
https://www.w3.org/2000/01/rdf-schema#label Data Encryption Standard
gptkbp:influenced subsequent encryption standards
gptkbp:influenced_by LUCIFER algorithm
gptkbp:input_output ciphertext
plaintext
gptkbp:is_adopted_by gptkb:NIST
gptkbp:is_implemented_in hardware and software
gptkbp:is_standardized_by gptkb:regulations
gptkbp:is_vulnerable_to brute-force attacks
gptkbp:key increased in variants
gptkbp:key_feature critical for security
gptkbp:key_schedule key expansion algorithm
gptkbp:known_for historical significance in cryptography
gptkbp:legacy in modern cryptography
gptkbp:notable_traits iterative structure
complexity of key schedule
fixed block size
fixed key size
use of S-boxes and P-boxes
vulnerability to differential cryptanalysis
vulnerability to linear cryptanalysis
historical importance in the development of cryptography
gptkbp:notable_users government agencies
gptkbp:operates block of data
gptkbp:part_of cryptographic standards
gptkbp:published_in FIPS PUB 46
gptkbp:related_to gptkb:crypt
gptkbp:replaced_by gptkb:Advanced_Encryption_Standard
gptkb:2001
gptkb:FIPS_PUB_197
gptkbp:rounds gptkb:16
gptkbp:security gptkb:blockade
low to moderate
round function
symmetric key encryption
considered weak today
final permutation
initial permutation
gptkbp:successor gptkb:AES
gptkbp:used_in financial transactions
secure communications
gptkbp:uses_key_size 56 bits
gptkbp:uses_permutation P-boxes
gptkbp:uses_substitution S-boxes
gptkbp:bfsParent gptkb:Advanced_Encryption_Standard
gptkbp:bfsLayer 5