• Home
  • /
  • Topic
  • /
  • Technology
  • /
  • Ibm
  • /
  • Identify and Describe the Weaknesses of the Data Encryption Standard DES Algorithm Dissertation Or Thesis Complete
Verified Document

Identify And Describe The Weaknesses Of The Data Encryption Standard DES Algorithm Dissertation Or Thesis Complete

¶ … weaknesses of the Data Encryption Standard (DES). The Data Encryption Standard (DES) was a system developed by the USD government for use by the general public. Accepted both by the U.S. And abroad, many hardware and software systems employ the DES. Both individuals can send and encrypt and decrypt information to and from the other. The symmetry of the situation makes this a popular key. Authenticity is guaranteed since only the sender can produce a message that will encrypt with the shared key (Paar, & Pelzl, 2009). However the DES is also riddled by various weaknesses (Pfleeger & Pfleeger, 2007).

Firstly and, perhaps, most importantly, security is a major concern. Whilst issues have been more or less resolved regarding the design's secrecy and that certain 'trapdoors' had been embedded in the DES algorithm enabling easy means to decrypt the message, many analysts are still concerned about the number of iterations considering 16 iterations to be insufficient in diffusing the information. Most serious of all, however,...

Parts of this document are hidden

View Full Document
svg-one

The shortness of the key could challenge security. Nonetheless, different strategies have been successfully developed to deal with this problem.
Other weaknesses of the DES focus on the algorithm itself. Firstly, there is the problem of complements. Complements refer to the case where 1s in a binary number replaces all 1s by 0s and all 0s. When a message is encrypted with a particular key, complement of that encryption will register as encryption of the message possibly confusing it. However, since most encryption messages do not involve or trigger complement response and since users can be warned not to use complement keys, this is not such a significant issue.

A second concern involves ' weak keys'. The initial key is split into two halves with both halves independently shifted circularly. If the value being shifted is either all 0s or all 1s, the key used for encryption will be the same in all other…

Sources used in this document:
References

Biham, E. & Shihar, A. (1993) Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag.

Coppersmith, D. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38, 243 -- 250.

Paar, C. & Pelzl, J. (2009). Understanding Cryptography, A Textbook for Students and Practitioners. Springer, 2009.

Pfleeger, CP & Pfleeger, SL. (2007). Cryptography Explained. Security in Computing, Fourth Edition, Pearson Education, Inc.: USA.
Cite this Document:
Copy Bibliography Citation

Related Documents

IBM DB2 Express - C Installing and
Words: 1080 Length: 3 Document Type: Essay

IBM DB2 Express - C Installing and Analyzing IBM DB2 Express -- C IBM DB2 Express-C database for Microsoft Windows was downloaded, installed and used as the basis of analysis in this paper. What differentiates UBM DB2 Express-C from the many comparable low-end enterprise-level databases is support for XML integration, dual core processors and 2GB of memory. IBM has been selling their DB2 databases for decades to enterprises globally, and has created

IBM Case Study Compare and Contrast the
Words: 940 Length: 3 Document Type: Case Study

IBM Case Study Compare and contrast the project portfolio management approaches that IBM and Deloitte Consulting used to rank and select the projects for their respective portfolios. IBM uses the Q-sort approach to manage their project portfolio. This approach enables them to analyze opinions raised by groups based on rankings given by each group member. The company embraced this strategy as a way of measuring the relationship between opinions of different employees.

IBM Culture IBM -- Maintaining Culture IBM
Words: 646 Length: 2 Document Type: Essay

IBM Culture IBM -- Maintaining Culture IBM was able to maintain its corporate culture for many years in the midst of an every changing environment. This paper explores how IBM was able to do so. IBM serves as a prime example for many organizations who wish for create a corporate culture that endures. The organization was able to embed a corporate culture that was able to withstand the pressures that are created by

IBM International Business Machines International
Words: 2542 Length: 10 Document Type: Term Paper

Also, IBM neglected gaining a more dominant position in the nascent industry in that period by allowing another corporation to take over the business of programming the new computers. Therefore, IBM missed this incredible opportunity which might have granted the company a dominant position on the market at that time. IBM has shown its innovation capabilities not only in technological areas, but in strategy models also. The company's negotiation strategy

IBM Case Study What Is the Key
Words: 1160 Length: 4 Document Type: Essay

IBM Case Study What is the key problem facing IBM Europe managers (at the end of the case)? It is a complex problem of recruiting more resellers for the new B2B initiative based on order capture, distributed order management, and minicomputer product configuration and customization workflows running RosettaNet PIPs over an XML network. This problem was made more complex by the fact that for any reseller to participate in the new B2B

IBM New UNIX Computer P690
Words: 915 Length: 3 Document Type: Term Paper

IBM New UNIX Computer Over the past years, Sun has managed to take the lion's share of the market for servers running the UNIX operating system. By putting mainframe-style features such as partitioning into its servers, and building hardware for its own Solaris operating system, Sun managed to take the lead with their UNIX systems (Vance). With the release of its p690 server, however, IBM is giving Sun some heavy competition and

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now