What is DES (Data Encryption Standard)? DES Algorithm Explained
Updated on Feb 12, 2025 | 9 min read | 6.7k views
Share:
For working professionals
For fresh graduates
More
Updated on Feb 12, 2025 | 9 min read | 6.7k views
Share:
Table of Contents
Encryption techniques serve as the backbone of data protection, preventing unauthorized access and safeguarding sensitive information. DES is a symmetric-key block cipher that encrypts data in 64-bit blocks using a 56-bit key, applying multiple rounds of complex transformations to enhance security.
Developed by IBM in the early 1970s and later adopted as a federal encryption standard by the U.S. National Institute of Standards and Technology (NIST) in 1977, the DES Algorithm became widely used in securing financial transactions, government communications, and various data security applications.
Despite its vulnerabilities, understanding the DES Algorithm remains essential for those studying cryptography, as it laid the foundation for stronger encryption techniques. In this blog, we will explore how the DES algorithm works, its key features, advantages, limitations, and why it is no longer recommended for securing sensitive data.
Nowadays, our daily life and activities are mainly based on the Internet. From storing personal information like photos, videos, and others to using various banking and financial applications, we rely on the Internet for almost everything.
These activities put our critical data at increasing risk. We must keep sensitive data away from any unauthorised access. Data confidentiality is the key here. It is where data encryption comes in.
If you use a computer to store critical data, you must wonder, “What is encryption in the computer?” This blog will explore data encryption and Data Encryption Standards.
Before delving further, the first thing to know is “what is DES in cryptography”. The Data Encryption Standard, or DES, is an algorithm for data encryption. It uses symmetric keys of 56-bit size.
The DES algorithm is an archetypal block cipher. It converts a plaintext bit of fixed length into a ciphertext bit string, keeping its length unchanged. The block size for DES is 64-bit.
From the very beginning, DES also received criticism due to 56-bit encryption being too short and a little insecure for modern applications. However, it played an integral role in the advancement of cryptography.
Various countries worldwide quickly adopted DES after IBM developed it in the early 1970s.
In 1972, the National Bureau of Standards (US) felt the need for an encryption standard to protect classified information. Around 1973, the Atalla Corporation invented a hardware security module, the first of its kind. It also boosted the need for an international encryption standard.
In 1974, IBM, a competitor to Atalla Corporation, proposed a cipher named DES. The IBM developed DES on an earlier algorithm called Horst Feistel’s Lucifer cipher. Horst Feistel, an IBM cryptographer, developed the Lucifer cipher in 1971.
In 1976, DES became an encryption standard approved by the US government, followed by its authorisation in 1977 to be used on all unclassified data. DES received a reaffirmation as a standard in 1983, 1988, 1993 and 1999.
2002 AES or Advanced Encryption Standard ousted DES as the accepted standard. In 2005, the NIST withdrew the DES algorithm and only approved Triple DES until 2030 for sensitive government information.
Triple DES, first proposed in 1981 by Merkle and Hellman, is a block cipher that uses a threefold DES algorithm. The Triple DES (TDES or 3DES) uses three keys – K1, K2 and K3. Using three keys is encryption, decryption and encryption again, for K1, K2 and K3, respectively.
Also, there is a double-key version of Triple DES.
The most notable uses of Triple DES include the electronic payment industry. Various Microsoft products also use it to protect user content and system data. Applications like Firefox also use Triple DES for encrypting website authentication login credentials.
The Initial Permutation or IP process occurs only once, that too before the first round. This is an adjustment process. It is more or less a jugglery of bit positions of the original text block.
For example, the IP process replaces the first bit with the 58th bit of original text, the second bit with the 50th bit, the third with the 42nd bit, and so on.
After the IP process is complete, the permuted 64-bit text block is divided into two half blocks, each consisting of 32 bits. These two blocks are Left Plain Text (LPT) and Right Plain Text (RPT).
Before the process begins, every 8th bit of the initial DES’s 64-bit key is eliminated. Hence, the bit positions eliminated are 8, 16, 24, 32, 40, 48, 56 and 64, thus, forming a 56-bit key.
Now, the Key Transformation includes generating a sub-key containing 48-bit positions from the 56-bit key. The 56-bit key divides into two halves, each of which is 28-bit. Depending on the number of the round, these halves get shifted by a position or two. For example, for the 1st,2nd,9th and 16th rounds, each of the two halves shifts by one position. For the remaining ones, they shift by two.
The process produces a 48-bit key. During the shifting procedure, some bits in the 56-bit key are lost. And thus, it forms the 48-bit key. This process is called compression permutation.
After IP, we had two halves — LPT and RPT. During this process, i.e., the expansion permutation, the RPT is expanded into 48-bit from 32-bit. The 32-bit RPT first divides into eight blocks. Each of these blocks contains 4 bits. Then an extra two bits are added to each 4-bit block resulting in 6-bit blocks.
After this, the bits undergo a permutation procedure to form 48-bit data. Further, an XOR function applies to the 48-bit RPT and the 48-bit key acquired from the compression permutation procedure.
Learn Software Development Courses online from the World’s top Universities. Earn Executive PG Programs, Advanced Certificate Programs or Masters Programs to fast-track your career.
The DES algorithm is a complex process involving several steps in both encryption and decryption.
The encryption process consists of the steps discussed below:
Step 1: Starts when the Initial Permutation function acquires the 64-bit plain text.
Step 2: The plain text block goes through the Initial Permutation or IP.
Step 3: A successful IP produces two permuted half blocks. These two are called LPT and RPT.
Step 4: This step takes 16 rounds of the encryption process. Both the LPT and RPT go through this procedure. The encryption procedure consists of five stages. These are-
Step 5: The two half blocks (RPT and LPT) are combined again. The newly merged block goes through a Final Permutation (FP) procedure.
Step 6: As a result, a 64-bit ciphertext is produced.
The steps for the decryption of data are following:
Step 1: Use the 16 round keys in reverse order.
Step 2: Apply the steps for encryption to the ciphertext.
Look up the Executive PG Programme in Full Stack Development from IIITB to gain in-depth knowledge of the process.
The DES implementation process consists of the following steps.
After completing the implementation, it is necessary to test the encryption to confirm its appropriate implementation.
The uses of the DES algorithm include:
There are five dive different modes of DES operation used widely.
Here, the encryption and decryption process of each 64-bit block occurs independently.
For this mode of operation, the previous ciphertext is used as the encryption algorithm’s input. The pseudorandom output then goes through an XOR function with the plaintext, creating the successive ciphertext.
Each of the 64-bit blocks depends on the preceding block. Also, it makes use of an Initialization Vector.
Every plaintext block goes through an XOR function with an encrypted counter. Then, for each succeeding block, the counter is further boosted.
OFB is very much like CFB. There is a slight difference between these two. The encryption algorithm’s input here is the output of the previous DES.
Take up the Full Stack Software Development Bootcamp to learn about DES and other aspects of cybersecurity.
AES, or Advanced Encryption Standard, replaced DES as the accepted standard. There are several differences between the two. The table below shows some of the significant dissimilarities between them.
Feature | DES | AES |
Full form | DES stands for Data Encryption Standard | AES stands for Advanced Encryption Standard |
Length of the key | 56 bit | Key length with different sizes such as 128 bits, 192 bits and 256 bits. |
Number of rounds | 16 rounds | Variable; 10 rounds for 128 bits, 12 for 192 bits and 14 for 256 bits |
Security level | Having weaknesses, DES is less reliable | AES is entirely reliable |
Vulnerability | Vulnerable to brute force attacks | Nothing found as of now |
Network-based on | Feistel network | Substitution and Permutation network |
Although DES has lost ground and is no longer the gold standard of encryption standards, you can still learn a lot by understanding DES. DES was the first encryption standard and the core of all the latest encryption standards. To have proper in-depth knowledge about data encryption, it’s always best to start from the very beginning.
Check out our free courses related to software development.
The DES algorithm was a pioneering encryption standard that significantly influenced the field of cryptography. With its 56-bit key and Feistel structure, it provided a strong level of security during its time. However, due to advancements in computing power, the DES algorithm became vulnerable to brute-force attacks, leading to its replacement by more secure encryption methods like Triple DES (3DES) and AES.
Despite its vulnerabilities, the DES algorithm remains an important milestone in the history of cryptography. It laid the foundation for modern encryption techniques and continues to be studied for its impact on data security. Today, stronger encryption standards ensure better protection against evolving cyber threats in an increasingly digital world.
If you are interested in data encryption, you can have a career in cybersecurity. The Master of Science in Computer Science from LJMU by upGrad offers a comprehensive understanding of the field with the knowledge of full stack development and assured placement assistance.
Get Free Consultation
By submitting, I accept the T&C and
Privacy Policy
India’s #1 Tech University
Executive PG Certification in AI-Powered Full Stack Development
77%
seats filled
Top Resources