Download the BYJU'S Exam Prep App for free GATE/ESE preparation videos & tests - Download the BYJU'S Exam Prep App for free GATE/ESE preparation videos & tests -

DES Full Form

What Is The Full Form Of DES?

The full form of DES is Data Encryption Standard.

DES is a cryptographic symmetric-key algorithm that encrypts digital data. Even though the short key length (56 bits) makes DES too insecure for any application- it is still very influential in advancing cryptography. It encrypts and decrypts data using a single key (symmetric key algorithm). It carries out encryption by dividing the available data into smaller chunks (64 bits). It then uses the encryption algorithm with a 56-bit key to encrypt the 64-bit cipher.

New encryption techniques have emerged over the years. Due to an increase in better brute-force attacks, DES has become very vulnerable. The new and better techniques helped users overcome this vulnerability. And thus, the successors of this algorithm emerged. For example, G-DES, DES-X, Triple DES, LOKI89, etc.

History of DES

  • The US government computer security’s National Bureau of Standards study needed a government-wide standard in 1972 for encrypting unclassified, sensitive information. That’s when DES originated.
  • IBM developers designed it in the early 1970s and published it in 1976 as the official FIPS (Federal Information Processing Standard) for the United States.

Characteristics of DES

  • It uses the symmetric-key algorithm.
  • The 56-bit key is the same for both decryption and encryption, created around permutations- which was very difficult to develop initially.
  • The DES algorithm uses substitution cipher as well as the transportation cipher techniques.
  • It was very efficient for hardware. It was also originally developed in 1970 for hardware.

Cryptanalysis and Security

  • A lot of info has been posted regarding the cryptanalysis of DES as compared to other block ciphers. But the only best practical attack till now is the brute-force.
  • We are aware of various minor properties of cryptanalysis. Three attacks are possible (theoretical).
  • The three attacks are theoretically less complex than the brute-force attack. Yet, carrying them out requires an unrealistic number of chosen or known plaintext. Thus, they aren’t a concern in practice.

Advantages of DES

  • It uses the symmetric-key algorithm. Thus, it is possible to perform encryption and decryption by a single key with the same algorithm.
  • The developers designed this algorithm for hardware and not software. Thus, DES is more efficient in hardware. They show a higher and faster implementation.

Disadvantages of DES

  • The security that DES provides is of a low level. The brute-force attack can feasibly devastate it with its 56-bit key.
  • The DES algorithm has lower efficiency with software. It only runs well in hardware, and its software implementation is very slow.
  • It does not provide a solution to the linear cryptanalysis because the problem started arriving way after the invention of DES.

Keep learning and stay tuned to get the latest updates on GATE Exam along with Eligibility Criteria, GATE Syllabus, Cut off, GATE Previous Year Question Papers, and more.


Leave a Comment

Your Mobile number and Email id will not be published.