gptkbp:instance_of
|
gptkb:security
|
gptkbp:block
|
64 bits
|
gptkbp:cryptanalysis
|
differential cryptanalysis
linear cryptanalysis
|
gptkbp:data_privacy
|
provides
|
gptkbp:decryption_process
|
inverse of encryption
|
gptkbp:developed_by
|
gptkb:National_Institute_of_Standards_and_Technology_(NIST)
|
gptkbp:expansion_permutation
|
gptkb:true
|
gptkbp:final_permutation
|
gptkb:true
|
gptkbp:first_published
|
gptkb:1977
|
gptkbp:has_programs
|
symmetric-key algorithm
|
https://www.w3.org/2000/01/rdf-schema#label
|
Data Encryption Standards (DES)
|
gptkbp:influenced_by
|
Feistel network
|
gptkbp:initial_permutation
|
gptkb:true
|
gptkbp:input_output
|
64 bits
|
gptkbp:is_standardized_by
|
gptkb:Federal_Information_Processing_Standards_(FIPS)
|
gptkbp:is_vulnerable_to
|
brute-force attacks
|
gptkbp:key_generation
|
based on initial key
|
gptkbp:key_length
|
56 bits
|
gptkbp:key_schedule
|
generates subkeys
|
gptkbp:key_space
|
2^56
|
gptkbp:legacy
|
gptkb:true
|
gptkbp:part_of
|
gptkb:crypt
|
gptkbp:related_to
|
gptkb:blockade
data protection
data security
key management
network security
symmetric encryption
cryptographic protocols
information security
secure data transmission
encryption algorithms
|
gptkbp:replaced_by
|
Triple DES (3 DES)
|
gptkbp:resolution
|
64 bits
|
gptkbp:rounds
|
gptkb:16
|
gptkbp:s-boxes
|
used for substitution
|
gptkbp:security
|
gptkb:CBC_(Cipher_Block_Chaining)
permutation and substitution
ECB (Electronic Codebook)
considered weak
CFB (Cipher Feedback)
CTR (Counter)
OFB (Output Feedback)
does not provide
|
gptkbp:successor
|
gptkb:Advanced_Encryption_Standard_(AES)
|
gptkbp:suitable_for
|
new systems
|
gptkbp:system
|
gptkb:SSL/_TLS
VPNs
disk encryption
file encryption
|
gptkbp:used_in
|
data encryption
secure communications
|
gptkbp:uses_feistel_structure
|
gptkb:true
|
gptkbp:bfsParent
|
gptkb:Windows_8.1
|
gptkbp:bfsLayer
|
5
|