The Data Encryption Standard

GPTKB entity

Statements (56)
Predicate Object
gptkbp:instanceOf encryption algorithm
gptkbp:bornIn 1977
gptkbp:canAllocate inverse of encryption process
gptkbp:designedFor data confidentiality
gptkbp:developedBy gptkb:National_Institute_of_Standards_and_Technology
gptkb:IBM
gptkbp:engine 64 bits
gptkbp:finalDisposal applied after rounds
gptkbp:firstGeneration applied before rounds
gptkbp:firstPublished 1975
https://www.w3.org/2000/01/rdf-schema#label The Data Encryption Standard
gptkbp:influencedBy Lucifer_cipher
gptkbp:inputOutput 64-bit blocks
gptkbp:is_used_in financial transactions
gptkbp:keyIssues 56 bits
generates round keys
gptkbp:keyLegislation inverse DES
gptkbp:knownFor simplicity and speed
gptkbp:numberOfStudents 16
gptkbp:partOf cryptography history
gptkbp:powerOutput 64-bit blocks
gptkbp:predecessor Lucifer_cipher
gptkbp:pressBox S-boxes
gptkbp:relatedTo cybersecurity
data integrity
data breaches
data protection
digital signatures
encryption standards
key management
network security
hash functions
privacy laws
cryptanalysis
cryptographic protocols
compliance regulations
information security
data authentication
asymmetric cryptography
symmetric cryptography
secure hash algorithm
gptkbp:replacedBy Advanced Encryption Standard
AES_in_2001
gptkbp:security DES
block cipher
symmetric key encryption
considered weak
vulnerable to brute-force attacks
gptkbp:standardFeatures FIPS PUB 46
gptkbp:successor gptkb:AES
gptkbp:usedIn gptkb:SSL/TLS
VPNs
disk encryption
secure communications
Wi-Fi security
gptkbp:uses gptkb:Feistel_structure