The Data Encryption Standard
GPTKB entity
Statements (56)
Predicate | Object |
---|---|
gptkbp:instanceOf |
encryption algorithm
|
gptkbp:bornIn |
1977
|
gptkbp:canAllocate |
inverse of encryption process
|
gptkbp:designedFor |
data confidentiality
|
gptkbp:developedBy |
gptkb:National_Institute_of_Standards_and_Technology
gptkb:IBM |
gptkbp:engine |
64 bits
|
gptkbp:finalDisposal |
applied after rounds
|
gptkbp:firstGeneration |
applied before rounds
|
gptkbp:firstPublished |
1975
|
https://www.w3.org/2000/01/rdf-schema#label |
The Data Encryption Standard
|
gptkbp:influencedBy |
Lucifer_cipher
|
gptkbp:inputOutput |
64-bit blocks
|
gptkbp:is_used_in |
financial transactions
|
gptkbp:keyIssues |
56 bits
generates round keys |
gptkbp:keyLegislation |
inverse DES
|
gptkbp:knownFor |
simplicity and speed
|
gptkbp:numberOfStudents |
16
|
gptkbp:partOf |
cryptography history
|
gptkbp:powerOutput |
64-bit blocks
|
gptkbp:predecessor |
Lucifer_cipher
|
gptkbp:pressBox |
S-boxes
|
gptkbp:relatedTo |
cybersecurity
data integrity data breaches data protection digital signatures encryption standards key management network security hash functions privacy laws cryptanalysis cryptographic protocols compliance regulations information security data authentication asymmetric cryptography symmetric cryptography secure hash algorithm |
gptkbp:replacedBy |
Advanced Encryption Standard
AES_in_2001 |
gptkbp:security |
DES
block cipher symmetric key encryption considered weak vulnerable to brute-force attacks |
gptkbp:standardFeatures |
FIPS PUB 46
|
gptkbp:successor |
gptkb:AES
|
gptkbp:usedIn |
gptkb:SSL/TLS
VPNs disk encryption secure communications Wi-Fi security |
gptkbp:uses |
gptkb:Feistel_structure
|