You are on page 1of 6

c 


       

|
|   |


||

|
|

|

| ||  |

||
  

!  "|

As the amount of data being transmitted over networks increase, so does the risk of this

information being intercepted and comprised by an outside source whether internal or external.

This has created great concern amongst consumer and businesses alike. There have been many

different strategies to combat this threat, which all generally include data encryption. The Data

Encryption Standard (DES) has been the most commonly used technique to secure information

being transmitted between a sender and a receiver. The widespread use of DES has allowed its

evolution into the more secure encryption method Triple DES (3DES).
  

|
|   |


||

|
|

|

| ||  |

||

| The Data Encryption Standard (DES) was accepted in 1977 by IBM and what is now the

National Institute of Standards and Technology (NIST) as a basic way to encrypt data. This

standard was based on an algorithm that changes inputs to create a different output. In this

algorithm, input is encrypted in 64-bit blocks, and the keys are 56-bit. This means that it

separates data into 64-bit blocks and sends each block through 56 steps to change it to create new

64-bit block output. To decrypt this data, the same 64-bit output must be put through the same

56 steps to obtain the original 64-bit input block.

DES can be implemented in four modes, which all have different levels of security.

These modes are listed below in the order of least to most secure:

1.| Electronic Cookbook (ECB)

2.| Cipher Block Chaining (CBC)

3.| Cipher Feedback (CFB)

4.| Output Feedback (OFB)

Even though these encryption methods can become very complex, the methodology is

patterned based, and also based on 64-bit technology. With today¶s high performance computers

and increasing Internet speeds, 64-bit encryption keys can be eventually be decrypted given
  

enough time. When used together, applications such as CoPatty, NMAP, Kismet, Etherape,

Ettercap, Wireshark, and Gerix-Wifi-Cracker-NG can capture and decrypt 64-bit and 128-bit

encryption keys. Due to the weaknesses of DES, this standard was decertified in 1988.

Despite of DES¶s vulnerabilities, it is still widely accepted and used as the building

blocks of modern encryption practices, and has helped catapult the evolution of more secure

encryption methods. The NIST has used DES as its foundation for the development of Triple

Data Encryption Algorithm (TDES). This algorithm is commonly referred to as 3DES. The

initial 56-bit key possibilities for DES was 72 quadrillion (Wiley.2001). 3DES can double or

triple the standard 56-bit key, creating a key a 112-bit or 168-bit encryption key (Coffee, 2004).

It also uses a technique that encrypts the data with one key, decrypts it with a second, then re-

crypts it with the first initial key. Based on this, you can say that the middle portion of this

method is more of decryption rather than encryption. This method not only multiplies the

amount key possibilities, it also adds key manipulation to add to the integrity of this newer

encryption technique. 3DES can be implemented with two or three encryption keys, which will

add even more key possibilities, making it more secure. Because of this, 3DES is becoming

more commonly used.

Both DES and 3DES can use the Cipher Block Chaining (CBC) method as a component

when executing steps within the encryption process. When using this technique, a unique

timestamp or number is attached to an encryption key via a data block. This data block is

generally known as a nonce. There are two recommended methods when using a nonce. The

first is to attach the nonce to the same key used to encrypt the initial plaintext. The nonce would

be a data block attached to each step in the encryption process, and possess a unique identifier.
  

The second is method is similar to the first, but instead would use a random data block created

from a random number generator.

A nonce plays a vital role when in the Key Distribution Center (KDC) strategy. In a

KDC scenario, the sender and receiver both possess a master shared key that is issued by the

KDC. When data is sent between the sender and its recipient, a second key is issued to each,

which is known as a session key. The nonce is then applied to this session key to give it a unique

identifier, to help ensure the data is protected and can only be viewed between sender and

receiver. The nonce helps prevent outsiders from effectively guessing encryption keys by

constantly changing.
  

|

ata encryption standard (DES). (2001). In Y  

     .

Retrieved May 9, 2010 from

http://www.credoreference.com/entry/hargravecomms/data_encryption_standard_des|

Coffee, P. (2004). DES defies demise. , (35), 50. Retrieved May 9, 2010 from

MasterFILE Premier database.|

You might also like