Professional Documents
Culture Documents
|
||
||
|
|
|
||| |
||
! "|
As the amount of data being transmitted over networks increase, so does the risk of this
information being intercepted and comprised by an outside source whether internal or external.
This has created great concern amongst consumer and businesses alike. There have been many
different strategies to combat this threat, which all generally include data encryption. The Data
Encryption Standard (DES) has been the most commonly used technique to secure information
being transmitted between a sender and a receiver. The widespread use of DES has allowed its
evolution into the more secure encryption method Triple DES (3DES).
|
||
||
|
|
|
||| |
||
| The Data Encryption Standard (DES) was accepted in 1977 by IBM and what is now the
National Institute of Standards and Technology (NIST) as a basic way to encrypt data. This
standard was based on an algorithm that changes inputs to create a different output. In this
algorithm, input is encrypted in 64-bit blocks, and the keys are 56-bit. This means that it
separates data into 64-bit blocks and sends each block through 56 steps to change it to create new
64-bit block output. To decrypt this data, the same 64-bit output must be put through the same
DES can be implemented in four modes, which all have different levels of security.
These modes are listed below in the order of least to most secure:
Even though these encryption methods can become very complex, the methodology is
patterned based, and also based on 64-bit technology. With today¶s high performance computers
and increasing Internet speeds, 64-bit encryption keys can be eventually be decrypted given
enough time. When used together, applications such as CoPatty, NMAP, Kismet, Etherape,
Ettercap, Wireshark, and Gerix-Wifi-Cracker-NG can capture and decrypt 64-bit and 128-bit
encryption keys. Due to the weaknesses of DES, this standard was decertified in 1988.
Despite of DES¶s vulnerabilities, it is still widely accepted and used as the building
blocks of modern encryption practices, and has helped catapult the evolution of more secure
encryption methods. The NIST has used DES as its foundation for the development of Triple
Data Encryption Algorithm (TDES). This algorithm is commonly referred to as 3DES. The
initial 56-bit key possibilities for DES was 72 quadrillion (Wiley.2001). 3DES can double or
triple the standard 56-bit key, creating a key a 112-bit or 168-bit encryption key (Coffee, 2004).
It also uses a technique that encrypts the data with one key, decrypts it with a second, then re-
crypts it with the first initial key. Based on this, you can say that the middle portion of this
method is more of decryption rather than encryption. This method not only multiplies the
amount key possibilities, it also adds key manipulation to add to the integrity of this newer
encryption technique. 3DES can be implemented with two or three encryption keys, which will
add even more key possibilities, making it more secure. Because of this, 3DES is becoming
Both DES and 3DES can use the Cipher Block Chaining (CBC) method as a component
when executing steps within the encryption process. When using this technique, a unique
timestamp or number is attached to an encryption key via a data block. This data block is
generally known as a nonce. There are two recommended methods when using a nonce. The
first is to attach the nonce to the same key used to encrypt the initial plaintext. The nonce would
be a data block attached to each step in the encryption process, and possess a unique identifier.
The second is method is similar to the first, but instead would use a random data block created
A nonce plays a vital role when in the Key Distribution Center (KDC) strategy. In a
KDC scenario, the sender and receiver both possess a master shared key that is issued by the
KDC. When data is sent between the sender and its recipient, a second key is issued to each,
which is known as a session key. The nonce is then applied to this session key to give it a unique
identifier, to help ensure the data is protected and can only be viewed between sender and
receiver. The nonce helps prevent outsiders from effectively guessing encryption keys by
constantly changing.
|
http://www.credoreference.com/entry/hargravecomms/data_encryption_standard_des|
Coffee, P. (2004). DES defies demise. , (35), 50. Retrieved May 9, 2010 from