• Home
  • /
  • Topic
  • /
  • Technology
  • /
  • Ibm
  • /
  • Identify and Describe the Weaknesses of the Data Encryption Standard DES Algorithm Dissertation Or Thesis Complete
Verified Document

Identify And Describe The Weaknesses Of The Data Encryption Standard DES Algorithm Dissertation Or Thesis Complete

¶ … weaknesses of the Data Encryption Standard (DES). The Data Encryption Standard (DES) was a system developed by the USD government for use by the general public. Accepted both by the U.S. And abroad, many hardware and software systems employ the DES. Both individuals can send and encrypt and decrypt information to and from the other. The symmetry of the situation makes this a popular key. Authenticity is guaranteed since only the sender can produce a message that will encrypt with the shared key (Paar, & Pelzl, 2009). However the DES is also riddled by various weaknesses (Pfleeger & Pfleeger, 2007).

Firstly and, perhaps, most importantly, security is a major concern. Whilst issues have been more or less resolved regarding the design's secrecy and that certain 'trapdoors' had been embedded in the DES algorithm enabling easy means to decrypt the message, many analysts are still concerned about the number of iterations considering 16 iterations to be insufficient in diffusing the information. Most serious of all, however,...

The shortness of the key could challenge security. Nonetheless, different strategies have been successfully developed to deal with this problem.
Other weaknesses of the DES focus on the algorithm itself. Firstly, there is the problem of complements. Complements refer to the case where 1s in a binary number replaces all 1s by 0s and all 0s. When a message is encrypted with a particular key, complement of that encryption will register as encryption of the message possibly confusing it. However, since most encryption messages do not involve or trigger complement response and since users can be warned not to use complement keys, this is not such a significant issue.

A second concern involves ' weak keys'. The initial key is split into two halves with both halves independently shifted circularly. If the value being shifted is either all 0s or all 1s, the key used for encryption will be the same in all other…

Sources used in this document:
References

Biham, E. & Shihar, A. (1993) Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag.

Coppersmith, D. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38, 243 -- 250.

Paar, C. & Pelzl, J. (2009). Understanding Cryptography, A Textbook for Students and Practitioners. Springer, 2009.

Pfleeger, CP & Pfleeger, SL. (2007). Cryptography Explained. Security in Computing, Fourth Edition, Pearson Education, Inc.: USA.
Cite this Document:
Copy Bibliography Citation

Related Documents

Comprehensive Study of Cryptographic Methods in Practice Today
Words: 4113 Length: 15 Document Type: Term Paper

Internet Encryption The growing sophistication of internet, along with advancing abilities of individuals to hack into electronic systems is creating a growing need for improved encryption technology. The internet is becoming a domain all to itself, with its own rules, and requirements. The internet is creating new opportunities for the business and communication industries. It is also creating new demands. The internet is now facing a period in its evolution similar

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now