Explore Courses
Liverpool Business SchoolLiverpool Business SchoolMBA by Liverpool Business School
  • 18 Months
Bestseller
Golden Gate UniversityGolden Gate UniversityMBA (Master of Business Administration)
  • 15 Months
Popular
O.P.Jindal Global UniversityO.P.Jindal Global UniversityMaster of Business Administration (MBA)
  • 12 Months
New
Birla Institute of Management Technology Birla Institute of Management Technology Post Graduate Diploma in Management (BIMTECH)
  • 24 Months
Liverpool John Moores UniversityLiverpool John Moores UniversityMS in Data Science
  • 18 Months
Popular
IIIT BangaloreIIIT BangalorePost Graduate Programme in Data Science & AI (Executive)
  • 12 Months
Bestseller
Golden Gate UniversityGolden Gate UniversityDBA in Emerging Technologies with concentration in Generative AI
  • 3 Years
upGradupGradData Science Bootcamp with AI
  • 6 Months
New
University of MarylandIIIT BangalorePost Graduate Certificate in Data Science & AI (Executive)
  • 8-8.5 Months
upGradupGradData Science Bootcamp with AI
  • 6 months
Popular
upGrad KnowledgeHutupGrad KnowledgeHutData Engineer Bootcamp
  • Self-Paced
upGradupGradCertificate Course in Business Analytics & Consulting in association with PwC India
  • 06 Months
OP Jindal Global UniversityOP Jindal Global UniversityMaster of Design in User Experience Design
  • 12 Months
Popular
WoolfWoolfMaster of Science in Computer Science
  • 18 Months
New
Jindal Global UniversityJindal Global UniversityMaster of Design in User Experience
  • 12 Months
New
Rushford, GenevaRushford Business SchoolDBA Doctorate in Technology (Computer Science)
  • 36 Months
IIIT BangaloreIIIT BangaloreCloud Computing and DevOps Program (Executive)
  • 8 Months
New
upGrad KnowledgeHutupGrad KnowledgeHutAWS Solutions Architect Certification
  • 32 Hours
upGradupGradFull Stack Software Development Bootcamp
  • 6 Months
Popular
upGradupGradUI/UX Bootcamp
  • 3 Months
upGradupGradCloud Computing Bootcamp
  • 7.5 Months
Golden Gate University Golden Gate University Doctor of Business Administration in Digital Leadership
  • 36 Months
New
Jindal Global UniversityJindal Global UniversityMaster of Design in User Experience
  • 12 Months
New
Golden Gate University Golden Gate University Doctor of Business Administration (DBA)
  • 36 Months
Bestseller
Ecole Supérieure de Gestion et Commerce International ParisEcole Supérieure de Gestion et Commerce International ParisDoctorate of Business Administration (DBA)
  • 36 Months
Rushford, GenevaRushford Business SchoolDoctorate of Business Administration (DBA)
  • 36 Months
KnowledgeHut upGradKnowledgeHut upGradSAFe® 6.0 Certified ScrumMaster (SSM) Training
  • Self-Paced
KnowledgeHut upGradKnowledgeHut upGradPMP® certification
  • Self-Paced
IIM KozhikodeIIM KozhikodeProfessional Certification in HR Management and Analytics
  • 6 Months
Bestseller
Duke CEDuke CEPost Graduate Certificate in Product Management
  • 4-8 Months
Bestseller
upGrad KnowledgeHutupGrad KnowledgeHutLeading SAFe® 6.0 Certification
  • 16 Hours
Popular
upGrad KnowledgeHutupGrad KnowledgeHutCertified ScrumMaster®(CSM) Training
  • 16 Hours
Bestseller
PwCupGrad CampusCertification Program in Financial Modelling & Analysis in association with PwC India
  • 4 Months
upGrad KnowledgeHutupGrad KnowledgeHutSAFe® 6.0 POPM Certification
  • 16 Hours
O.P.Jindal Global UniversityO.P.Jindal Global UniversityMaster of Science in Artificial Intelligence and Data Science
  • 12 Months
Bestseller
Liverpool John Moores University Liverpool John Moores University MS in Machine Learning & AI
  • 18 Months
Popular
Golden Gate UniversityGolden Gate UniversityDBA in Emerging Technologies with concentration in Generative AI
  • 3 Years
IIIT BangaloreIIIT BangaloreExecutive Post Graduate Programme in Machine Learning & AI
  • 13 Months
Bestseller
IIITBIIITBExecutive Program in Generative AI for Leaders
  • 4 Months
upGradupGradAdvanced Certificate Program in GenerativeAI
  • 4 Months
New
IIIT BangaloreIIIT BangalorePost Graduate Certificate in Machine Learning & Deep Learning (Executive)
  • 8 Months
Bestseller
Jindal Global UniversityJindal Global UniversityMaster of Design in User Experience
  • 12 Months
New
Liverpool Business SchoolLiverpool Business SchoolMBA with Marketing Concentration
  • 18 Months
Bestseller
Golden Gate UniversityGolden Gate UniversityMBA with Marketing Concentration
  • 15 Months
Popular
MICAMICAAdvanced Certificate in Digital Marketing and Communication
  • 6 Months
Bestseller
MICAMICAAdvanced Certificate in Brand Communication Management
  • 5 Months
Popular
upGradupGradDigital Marketing Accelerator Program
  • 05 Months
Jindal Global Law SchoolJindal Global Law SchoolLL.M. in Corporate & Financial Law
  • 12 Months
Bestseller
Jindal Global Law SchoolJindal Global Law SchoolLL.M. in AI and Emerging Technologies (Blended Learning Program)
  • 12 Months
Jindal Global Law SchoolJindal Global Law SchoolLL.M. in Intellectual Property & Technology Law
  • 12 Months
Jindal Global Law SchoolJindal Global Law SchoolLL.M. in Dispute Resolution
  • 12 Months
upGradupGradContract Law Certificate Program
  • Self paced
New
ESGCI, ParisESGCI, ParisDoctorate of Business Administration (DBA) from ESGCI, Paris
  • 36 Months
Golden Gate University Golden Gate University Doctor of Business Administration From Golden Gate University, San Francisco
  • 36 Months
Rushford Business SchoolRushford Business SchoolDoctor of Business Administration from Rushford Business School, Switzerland)
  • 36 Months
Edgewood CollegeEdgewood CollegeDoctorate of Business Administration from Edgewood College
  • 24 Months
Golden Gate UniversityGolden Gate UniversityDBA in Emerging Technologies with Concentration in Generative AI
  • 36 Months
Golden Gate University Golden Gate University DBA in Digital Leadership from Golden Gate University, San Francisco
  • 36 Months
Liverpool Business SchoolLiverpool Business SchoolMBA by Liverpool Business School
  • 18 Months
Bestseller
Golden Gate UniversityGolden Gate UniversityMBA (Master of Business Administration)
  • 15 Months
Popular
O.P.Jindal Global UniversityO.P.Jindal Global UniversityMaster of Business Administration (MBA)
  • 12 Months
New
Deakin Business School and Institute of Management Technology, GhaziabadDeakin Business School and IMT, GhaziabadMBA (Master of Business Administration)
  • 12 Months
Liverpool John Moores UniversityLiverpool John Moores UniversityMS in Data Science
  • 18 Months
Bestseller
O.P.Jindal Global UniversityO.P.Jindal Global UniversityMaster of Science in Artificial Intelligence and Data Science
  • 12 Months
Bestseller
IIIT BangaloreIIIT BangalorePost Graduate Programme in Data Science (Executive)
  • 12 Months
Bestseller
O.P.Jindal Global UniversityO.P.Jindal Global UniversityO.P.Jindal Global University
  • 12 Months
WoolfWoolfMaster of Science in Computer Science
  • 18 Months
New
Liverpool John Moores University Liverpool John Moores University MS in Machine Learning & AI
  • 18 Months
Popular
Golden Gate UniversityGolden Gate UniversityDBA in Emerging Technologies with concentration in Generative AI
  • 3 Years
Rushford, GenevaRushford Business SchoolDoctorate of Business Administration (AI/ML)
  • 36 Months
Ecole Supérieure de Gestion et Commerce International ParisEcole Supérieure de Gestion et Commerce International ParisDBA Specialisation in AI & ML
  • 36 Months
Golden Gate University Golden Gate University Doctor of Business Administration (DBA)
  • 36 Months
Bestseller
Ecole Supérieure de Gestion et Commerce International ParisEcole Supérieure de Gestion et Commerce International ParisDoctorate of Business Administration (DBA)
  • 36 Months
Rushford, GenevaRushford Business SchoolDoctorate of Business Administration (DBA)
  • 36 Months
Liverpool Business SchoolLiverpool Business SchoolMBA with Marketing Concentration
  • 18 Months
Bestseller
Golden Gate UniversityGolden Gate UniversityMBA with Marketing Concentration
  • 15 Months
Popular
Jindal Global Law SchoolJindal Global Law SchoolLL.M. in Corporate & Financial Law
  • 12 Months
Bestseller
Jindal Global Law SchoolJindal Global Law SchoolLL.M. in Intellectual Property & Technology Law
  • 12 Months
Jindal Global Law SchoolJindal Global Law SchoolLL.M. in Dispute Resolution
  • 12 Months
IIITBIIITBExecutive Program in Generative AI for Leaders
  • 4 Months
New
IIIT BangaloreIIIT BangaloreExecutive Post Graduate Programme in Machine Learning & AI
  • 13 Months
Bestseller
upGradupGradData Science Bootcamp with AI
  • 6 Months
New
upGradupGradAdvanced Certificate Program in GenerativeAI
  • 4 Months
New
KnowledgeHut upGradKnowledgeHut upGradSAFe® 6.0 Certified ScrumMaster (SSM) Training
  • Self-Paced
upGrad KnowledgeHutupGrad KnowledgeHutCertified ScrumMaster®(CSM) Training
  • 16 Hours
upGrad KnowledgeHutupGrad KnowledgeHutLeading SAFe® 6.0 Certification
  • 16 Hours
KnowledgeHut upGradKnowledgeHut upGradPMP® certification
  • Self-Paced
upGrad KnowledgeHutupGrad KnowledgeHutAWS Solutions Architect Certification
  • 32 Hours
upGrad KnowledgeHutupGrad KnowledgeHutAzure Administrator Certification (AZ-104)
  • 24 Hours
KnowledgeHut upGradKnowledgeHut upGradAWS Cloud Practioner Essentials Certification
  • 1 Week
KnowledgeHut upGradKnowledgeHut upGradAzure Data Engineering Training (DP-203)
  • 1 Week
MICAMICAAdvanced Certificate in Digital Marketing and Communication
  • 6 Months
Bestseller
MICAMICAAdvanced Certificate in Brand Communication Management
  • 5 Months
Popular
IIM KozhikodeIIM KozhikodeProfessional Certification in HR Management and Analytics
  • 6 Months
Bestseller
Duke CEDuke CEPost Graduate Certificate in Product Management
  • 4-8 Months
Bestseller
Loyola Institute of Business Administration (LIBA)Loyola Institute of Business Administration (LIBA)Executive PG Programme in Human Resource Management
  • 11 Months
Popular
Goa Institute of ManagementGoa Institute of ManagementExecutive PG Program in Healthcare Management
  • 11 Months
IMT GhaziabadIMT GhaziabadAdvanced General Management Program
  • 11 Months
Golden Gate UniversityGolden Gate UniversityProfessional Certificate in Global Business Management
  • 6-8 Months
upGradupGradContract Law Certificate Program
  • Self paced
New
IU, GermanyIU, GermanyMaster of Business Administration (90 ECTS)
  • 18 Months
Bestseller
IU, GermanyIU, GermanyMaster in International Management (120 ECTS)
  • 24 Months
Popular
IU, GermanyIU, GermanyB.Sc. Computer Science (180 ECTS)
  • 36 Months
Clark UniversityClark UniversityMaster of Business Administration
  • 23 Months
New
Golden Gate UniversityGolden Gate UniversityMaster of Business Administration
  • 20 Months
Clark University, USClark University, USMS in Project Management
  • 20 Months
New
Edgewood CollegeEdgewood CollegeMaster of Business Administration
  • 23 Months
The American Business SchoolThe American Business SchoolMBA with specialization
  • 23 Months
New
Aivancity ParisAivancity ParisMSc Artificial Intelligence Engineering
  • 24 Months
Aivancity ParisAivancity ParisMSc Data Engineering
  • 24 Months
The American Business SchoolThe American Business SchoolMBA with specialization
  • 23 Months
New
Aivancity ParisAivancity ParisMSc Artificial Intelligence Engineering
  • 24 Months
Aivancity ParisAivancity ParisMSc Data Engineering
  • 24 Months
upGradupGradData Science Bootcamp with AI
  • 6 Months
Popular
upGrad KnowledgeHutupGrad KnowledgeHutData Engineer Bootcamp
  • Self-Paced
upGradupGradFull Stack Software Development Bootcamp
  • 6 Months
Bestseller
KnowledgeHut upGradKnowledgeHut upGradBackend Development Bootcamp
  • Self-Paced
upGradupGradUI/UX Bootcamp
  • 3 Months
upGradupGradCloud Computing Bootcamp
  • 7.5 Months
PwCupGrad CampusCertification Program in Financial Modelling & Analysis in association with PwC India
  • 5 Months
upGrad KnowledgeHutupGrad KnowledgeHutSAFe® 6.0 POPM Certification
  • 16 Hours
upGradupGradDigital Marketing Accelerator Program
  • 05 Months
upGradupGradAdvanced Certificate Program in GenerativeAI
  • 4 Months
New
upGradupGradData Science Bootcamp with AI
  • 6 Months
Popular
upGradupGradFull Stack Software Development Bootcamp
  • 6 Months
Bestseller
upGradupGradUI/UX Bootcamp
  • 3 Months
PwCupGrad CampusCertification Program in Financial Modelling & Analysis in association with PwC India
  • 4 Months
upGradupGradCertificate Course in Business Analytics & Consulting in association with PwC India
  • 06 Months
upGradupGradDigital Marketing Accelerator Program
  • 05 Months

What is DES (Data Encryption Standard)? DES Algorithm Explained

Updated on 21 August, 2023

6.5K+ views
9 min read

Introduction

Nowadays, our daily life and activities are mainly based on the Internet. From storing personal information like photos, videos, and others to using various banking and financial applications, we rely on the Internet for almost everything.

These activities put our critical data at increasing risk. We must keep sensitive data away from any unauthorised access. Data confidentiality is the key here. It is where data encryption comes in.

If you use a computer to store critical data, you must wonder, “What is encryption in the computer?” This blog will explore data encryption and Data Encryption Standards.

What Is Data Encryption Standard (DES)?

Before delving further, the first thing to know is “what is DES in cryptography”. The Data Encryption Standard, or DES, is an algorithm for data encryption. It uses symmetric keys of 56-bit size.

The DES algorithm is an archetypal block cipher. It converts a plaintext bit of fixed length into a ciphertext bit string, keeping its length unchanged. The block size for DES is 64-bit.

From the very beginning, DES also received criticism due to 56-bit encryption being too short and a little insecure for modern applications. However, it played an integral role in the advancement of cryptography.

Past Record of DES Algorithm

Various countries worldwide quickly adopted DES after IBM developed it in the early 1970s. 

In 1972, the National Bureau of Standards (US) felt the need for an encryption standard to protect classified information. Around 1973, the Atalla Corporation invented a hardware security module, the first of its kind. It also boosted the need for an international encryption standard.

In 1974, IBM, a competitor to Atalla Corporation, proposed a cipher named DES. The IBM developed DES on an earlier algorithm called Horst Feistel’s Lucifer cipher. Horst Feistel, an IBM cryptographer, developed the Lucifer cipher in 1971. 

In 1976, DES became an encryption standard approved by the US government, followed by its authorisation in 1977 to be used on all unclassified data. DES received a reaffirmation as a standard in 1983, 1988, 1993 and 1999.

2002 AES or Advanced Encryption Standard ousted DES as the accepted standard. In 2005, the NIST withdrew the DES algorithm and only approved Triple DES until 2030 for sensitive government information.

What Is Triple DES Algorithm?

Triple DES, first proposed in 1981 by Merkle and Hellman, is a block cipher that uses a threefold DES algorithm. The Triple DES (TDES or 3DES) uses three keys – K1, K2 and K3. Using three keys is encryption, decryption and encryption again, for K1, K2 and K3, respectively.

Also, there is a double-key version of Triple DES.

The most notable uses of Triple DES include the electronic payment industry. Various Microsoft products also use it to protect user content and system data. Applications like Firefox also use Triple DES for encrypting website authentication login credentials.

Step-by-Step Guide to Initial Permutation

The Initial Permutation or IP process occurs only once, that too before the first round. This is an adjustment process. It is more or less a jugglery of bit positions of the original text block. 

For example, the IP process replaces the first bit with the 58th bit of original text, the second bit with the 50th bit, the third with the 42nd bit, and so on.

After the IP process is complete, the permuted 64-bit text block is divided into two half blocks, each consisting of 32 bits. These two blocks are Left Plain Text (LPT) and Right Plain Text (RPT).

Step 1: Key Transformation

Before the process begins, every 8th bit of the initial DES’s 64-bit key is eliminated. Hence, the bit positions eliminated are 8, 16, 24, 32, 40, 48, 56 and 64, thus, forming a 56-bit key.

Now, the Key Transformation includes generating a sub-key containing 48-bit positions from the 56-bit key. The 56-bit key divides into two halves, each of which is 28-bit. Depending on the number of the round, these halves get shifted by a position or two. For example, for the 1st,2nd,9th and 16th rounds, each of the two halves shifts by one position. For the remaining ones, they shift by two. 

The process produces a 48-bit key. During the shifting procedure, some bits in the 56-bit key are lost. And thus, it forms the 48-bit key. This process is called compression permutation.

Step 2: Expansion Permutation

After IP, we had two halves — LPT and RPT. During this process, i.e., the expansion permutation, the RPT is expanded into 48-bit from 32-bit. The 32-bit RPT first divides into eight blocks. Each of these blocks contains 4 bits. Then an extra two bits are added to each 4-bit block resulting in 6-bit blocks.

After this, the bits undergo a permutation procedure to form 48-bit data. Further, an XOR function applies to the 48-bit RPT and the 48-bit key acquired from the compression permutation procedure.

Learn Software Development Courses online from the World’s top Universities. Earn Executive PG Programs, Advanced Certificate Programs or Masters Programs to fast-track your career.

What Are the Steps of the DES Algorithm?

The DES algorithm is a complex process involving several steps in both encryption and decryption.

Steps for Encryption

The encryption process consists of the steps discussed below:

Step 1: Starts when the Initial Permutation function acquires the 64-bit plain text.

Step 2: The plain text block goes through the Initial Permutation or IP.

Step 3: A successful IP produces two permuted half blocks. These two are called LPT and RPT.

Step 4: This step takes 16 rounds of the encryption process. Both the LPT and RPT go through this procedure. The encryption procedure consists of five stages. These are-

  • S-box Permutation
  • Key Transformation
  • P-box Permutation
  • Expansion Permutation
  • XOR and Swapping

Step 5: The two half blocks (RPT and LPT) are combined again. The newly merged block goes through a Final Permutation (FP) procedure.

Step 6: As a result, a 64-bit ciphertext is produced.

Steps for Decryption

The steps for the decryption of data are following:

Step 1: Use the 16 round keys in reverse order.

Step 2: Apply the steps for encryption to the ciphertext.

Look up the Executive PG Programme in Full Stack Development from IIITB to gain in-depth knowledge of the process.

Implementing and Testing Process for DES

The DES implementation process consists of the following steps.

  • First, choose a security provider of the many available. It is one of the most crucial stages of the implementation to select one. Sometimes, choosing the security provider depends on the language you are using.
  • The next step involves generating a key. You can either create a key yourself or can use a KeyGenerator.

After completing the implementation, it is necessary to test the encryption to confirm its appropriate implementation.

What Are the Practical Applications of the DES Algorithm?

The uses of the DES algorithm include:

  • When a comparatively less secure encryption can do the job, DES is a perfect choice.
  • DES can generate random numbers.
  • Also, DES produces a Triple DES algorithm and uses three DES keys in the procedure.

What Are the Various Modes in Which DES Operates?

There are five dive different modes of DES operation used widely. 

  • Electronic Codebook (ECB)

Here, the encryption and decryption process of each 64-bit block occurs independently.

  • Cipher Feedback (CFB)

For this mode of operation, the previous ciphertext is used as the encryption algorithm’s input. The pseudorandom output then goes through an XOR function with the plaintext, creating the successive ciphertext.

  • Cipher Block Chaining (CBC)

Each of the 64-bit blocks depends on the preceding block. Also, it makes use of an Initialization Vector.

  • Counter (CTR)

Every plaintext block goes through an XOR function with an encrypted counter. Then, for each succeeding block, the counter is further boosted.

  • Output Feedback (OFB)

OFB is very much like CFB. There is a slight difference between these two. The encryption algorithm’s input here is the output of the previous DES.

Take up the Full Stack Software Development Bootcamp to learn about DES and other aspects of cybersecurity.

Comparing DES and AES Algorithms

AES, or Advanced Encryption Standard, replaced DES as the accepted standard. There are several differences between the two. The table below shows some of the significant dissimilarities between them.

Feature DES AES
Full form DES stands for Data Encryption Standard AES stands for Advanced Encryption Standard
Length of the key 56 bit Key length with different sizes such as 128 bits, 192 bits and 256 bits.
Number of rounds 16 rounds Variable; 10 rounds for 128 bits, 12 for 192 bits and 14 for 256 bits
Security level Having weaknesses, DES is less reliable AES is entirely reliable
Vulnerability Vulnerable to brute force attacks  Nothing found as of now
Network-based on Feistel network Substitution and Permutation network

DES Algorithm – Pros and Cons 

Advantages

  • Cryptographers have been using DES since 1977. The Brute Force attack is the only vulnerability in the DES algorithm until now.
  • DES was approved as a federal encryption standard for a long time.
  • The 168-bit key used by Triple DES is tough to crack.

Disadvantages

  • The 56-bit key has made DES vulnerable. Deep Cracker, a machine that cracks DES, is available for sale.
  • With the advent of AES, which is a lot more complex, DES has fallen out of favour.
  • DES works a lot slower in software than it works on hardware.

Why Learn an Encryption Standard That Has Become Irrelevant?

Although DES has lost ground and is no longer the gold standard of encryption standards,  you can still learn a lot by understanding DES. DES was the first encryption standard and the core of all the latest encryption standards. To have proper in-depth knowledge about data encryption, it’s always best to start from the very beginning.

Check out our free courses related to software development.

Conclusion

This thorough discussion on “What is encryption in cybersecurity?” reveals that DES was and probably still is the stepping stone in cybersecurity. However, it is only a minor part of an extensive field of study, with much more to learn.

If you are interested in data encryption, you can have a career in cybersecurity. The Master of Science in Computer Science from LJMU by upGrad offers a comprehensive understanding of the field with the knowledge of full stack development and assured placement assistance.

Frequently Asked Questions (FAQs)

1. How does DES encryption work to secure data?

DES secures data by converting a plaintext bit into a ciphertext bit without changing the length of the key.

2. What is Data Encryption Standard’s relevance today?

Data Encryption Standard is only used for learning the history of cybersecurity today. However, Triple DES is still in use.

3. How does the key length in DES impact its security?

The key length in DES is 56-bit which is a bit too short. For that, the security of DES is weaker than the one using 128 or 256-bit keys.

4. What is Data Encryption Standard’s role in cybersecurity?

DES was the first encryption standard. It paved the way for newer and more secure encryption standards. It was the foundation stone of cybersecurity.

RELATED PROGRAMS