• Home
  • /
  • Topic
  • /
  • Technology
  • /
  • Ibm
  • /
  • Identify and Describe the Weaknesses of the Data Encryption Standard DES Algorithm Dissertation Or Thesis Complete
Verified Document

Identify And Describe The Weaknesses Of The Data Encryption Standard DES Algorithm Dissertation Or Thesis Complete

¶ … weaknesses of the Data Encryption Standard (DES). The Data Encryption Standard (DES) was a system developed by the USD government for use by the general public. Accepted both by the U.S. And abroad, many hardware and software systems employ the DES. Both individuals can send and encrypt and decrypt information to and from the other. The symmetry of the situation makes this a popular key. Authenticity is guaranteed since only the sender can produce a message that will encrypt with the shared key (Paar, & Pelzl, 2009). However the DES is also riddled by various weaknesses (Pfleeger & Pfleeger, 2007).

Firstly and, perhaps, most importantly, security is a major concern. Whilst issues have been more or less resolved regarding the design's secrecy and that certain 'trapdoors' had been embedded in the DES algorithm enabling easy means to decrypt the message, many analysts are still concerned about the number of iterations considering 16 iterations to be insufficient in diffusing the information. Most serious of all, however,...

The shortness of the key could challenge security. Nonetheless, different strategies have been successfully developed to deal with this problem.
Other weaknesses of the DES focus on the algorithm itself. Firstly, there is the problem of complements. Complements refer to the case where 1s in a binary number replaces all 1s by 0s and all 0s. When a message is encrypted with a particular key, complement of that encryption will register as encryption of the message possibly confusing it. However, since most encryption messages do not involve or trigger complement response and since users can be warned not to use complement keys, this is not such a significant issue.

A second concern involves ' weak keys'. The initial key is split into two halves with both halves independently shifted circularly. If the value being shifted is either all 0s or all 1s, the key used for encryption will be the same in all other…

Sources used in this document:
References

Biham, E. & Shihar, A. (1993) Differential Cryptanalysis of the Data Encryption Standard, Springer Verlag.

Coppersmith, D. (1994). The data encryption standard (DES) and its strength against attacks. IBM Journal of Research and Development, 38, 243 -- 250.

Paar, C. & Pelzl, J. (2009). Understanding Cryptography, A Textbook for Students and Practitioners. Springer, 2009.

Pfleeger, CP & Pfleeger, SL. (2007). Cryptography Explained. Security in Computing, Fourth Edition, Pearson Education, Inc.: USA.
Cite this Document:
Copy Bibliography Citation

Related Documents

Comprehensive Study of Cryptographic Methods in Practice Today
Words: 4113 Length: 15 Document Type: Term Paper

Internet Encryption The growing sophistication of internet, along with advancing abilities of individuals to hack into electronic systems is creating a growing need for improved encryption technology. The internet is becoming a domain all to itself, with its own rules, and requirements. The internet is creating new opportunities for the business and communication industries. It is also creating new demands. The internet is now facing a period in its evolution similar

Wireless Networking Technology and Security:
Words: 7497 Length: 22 Document Type: Research Proposal

Bluetooth devices use encryption security and this makes the requirement of a "unique key session key to derive per-packet keys thus avoiding frequent key reuse." (Kennedy and Hunt, 2008, p.4) Kennedy and Hunt report that ZigBee is a reasonably priced low energy consumption two-way CDMA/BA-based wireless communications standard which is based on IEEE 802.15.4 which is referred to commonly as a 'Low Rate Wireless Personal Area Networks (LR-WPANs) and which

Network Vulnerabilities That Avionics Are
Words: 2859 Length: 10 Document Type: Research Paper

In this manner, it makes network management and filtering a lot easier. Even though SPF can protect the network infrastructure against certain attacks that are known to exploit the weaknesses that are inherent in the various network level protocols, it can never provide protection at application level. The application defense needs more awareness of the content of the payload. Circuit Proxy Firewall (CPF) This type of firewall operates by relying as

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now