Statements (53)
Predicate | Object |
---|---|
gptkbp:instance_of |
gptkb:crypt
|
gptkbp:algorithm_family |
symmetric algorithms
|
gptkbp:block |
64 bits
|
gptkbp:designed_for |
data confidentiality
|
gptkbp:developed_by |
gptkb:IBM
|
gptkbp:first_published |
gptkb:1977
|
gptkbp:has_programs |
Feistel network
|
https://www.w3.org/2000/01/rdf-schema#label |
Data Encryption Standard
|
gptkbp:influenced |
subsequent encryption standards
|
gptkbp:influenced_by |
LUCIFER algorithm
|
gptkbp:input_output |
ciphertext
plaintext |
gptkbp:is_adopted_by |
gptkb:NIST
|
gptkbp:is_implemented_in |
hardware and software
|
gptkbp:is_standardized_by |
gptkb:regulations
|
gptkbp:is_vulnerable_to |
brute-force attacks
|
gptkbp:key |
increased in variants
|
gptkbp:key_feature |
critical for security
|
gptkbp:key_schedule |
key expansion algorithm
|
gptkbp:known_for |
historical significance in cryptography
|
gptkbp:legacy |
in modern cryptography
|
gptkbp:notable_traits |
iterative structure
complexity of key schedule fixed block size fixed key size use of S-boxes and P-boxes vulnerability to differential cryptanalysis vulnerability to linear cryptanalysis historical importance in the development of cryptography |
gptkbp:notable_users |
government agencies
|
gptkbp:operates |
block of data
|
gptkbp:part_of |
cryptographic standards
|
gptkbp:published_in |
FIPS PUB 46
|
gptkbp:related_to |
gptkb:crypt
|
gptkbp:replaced_by |
gptkb:Advanced_Encryption_Standard
gptkb:2001 gptkb:FIPS_PUB_197 |
gptkbp:rounds |
gptkb:16
|
gptkbp:security |
gptkb:blockade
low to moderate round function symmetric key encryption considered weak today final permutation initial permutation |
gptkbp:successor |
gptkb:AES
|
gptkbp:used_in |
financial transactions
secure communications |
gptkbp:uses_key_size |
56 bits
|
gptkbp:uses_permutation |
P-boxes
|
gptkbp:uses_substitution |
S-boxes
|
gptkbp:bfsParent |
gptkb:Advanced_Encryption_Standard
|
gptkbp:bfsLayer |
5
|