StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Is DES cipher not security anymore - Essay Example

Cite this document
Summary
This is particularly because DES is a weak, old and broken encryption algorithm that is highly susceptible to brute force attacks (Curtin, Dolske, 1998, p.4). For example, the DES cryptanalysis…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER95.1% of users find it useful
Is DES cipher not security anymore
Read Text Preview

Extract of sample "Is DES cipher not security anymore"

Is DES Cipher not Security Anymore? Insert (s) Is DES Cipher not Security Anymore? I agree with EFF that Data Encryption Standard (DES) cipher is not anymore security. This is particularly because DES is a weak, old and broken encryption algorithm that is highly susceptible to brute force attacks (Curtin, Dolske, 1998, p.4). For example, the DES cryptanalysis carried out by Electronic Frontier Foundation (EFF) in 1998 revealed that given a finite time, DES can easily be cracked by a modestly financed adversary.

This is further compounded by the fact that while it may have cost EFF $250,000 to successfully crack DES in 1998, it can now be achieved for a considerably less cost and time.Although DES are still being used as a means of encryption by many organizations and governments, DES has significantly deprecated and is no longer secure as just anyone with a little technical know-how and time can break into the cryptographic keys. However, this does not mean that DES cipher should never be used all. It only means that it is important to evaluate the value of the information to be protected, both to the attacker and to the owner, and fully grasp the nature of the risks before making the decision to use Data Encryption Standard (DES) cipher.

According to Stallings (2006, p.73), DES may still provide security if used in situations involving no real threats such as when encrypting files on a family PC.In conclusion, in view of the contemporary threats, DES algorithm offers very little deterrence for any determined adversary and should never be considered to be secure. Using more efficient and stronger cryptographic algorithms such as Advanced Encryption Standard (AES) and 3DES among others may provide better security.ReferencesCurtin, M.

& Dolske, J. 1998. A Brute Force Search of DES Keyspace. Available at .Stallings, W. 2006. Cryptography and network security: principles and practice. New York: Prentice Hall

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Is DES cipher not security anymore Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Is DES cipher not security anymore Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1675628-is-des-cipher-not-security-anymore
(Is DES Cipher Not Security Anymore Essay Example | Topics and Well Written Essays - 250 Words)
Is DES Cipher Not Security Anymore Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1675628-is-des-cipher-not-security-anymore.
“Is DES Cipher Not Security Anymore Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1675628-is-des-cipher-not-security-anymore.
  • Cited: 0 times

CHECK THESE SAMPLES OF Is DES cipher not security anymore

Introduction to Cryptography Using CrypTool

Of the three ciphers discussed (Caesar, Vigenere, Playfair), what are their relative degrees of security and why?... hellip; Which tool or technique from the above list would be most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher, and why?... The N-gram list of Caesar encryption of the document itself would be the most effective for a cryptanalyst to use to decipher a text encrypted with the Caesar cipher as it shows the frequency of each character used in the document....
4 Pages (1000 words) Coursework

Fundamentals of Cryptology

At the base of all internet communication and data security lays cryptology that serves as the foundation to security and data authenticity.... In this regard, it is important to note that for a cipher to work properly it is important to invest in resources....
8 Pages (2000 words) Research Proposal

The Core Features of Blowfish Algorithm

It is another type of robust security wireless network where access points are mandatory along with a wired LAN connectivity, infrastructure, and administration overhead.... However, the public key can be used without any security.... The paper "The Core Features of Blowfish Algorithm" gives detailed information about Infrastructure WLAN....
15 Pages (3750 words) Assignment

Digital Encryption Standard

This increase in the number of rounds ensures high level of security… Due to its short key length (56) 3DES was developed.... However, fixed S boxes On the other hand, bblowfish is a symmetric block cipher and operates in 64-bit block size and a variable key length - from 32 bits to 448bits with 16-round Feistel cipher and uses large key-dependent S-boxes.... In des, the main algorithm is repeated 16 times to produce the ciphertext....
12 Pages (3000 words) Research Paper

Asymmetric or Symmetric Key Encryption

This encryption technique provides higher security as it makes use of two keys: one for encryption and another for decryption.... Fig1 demonstrates the process of Symmetric-key encryption:Figure 1Process of Symmetric Encryption, Image Source: (Stretch, 2010)In addition, des, 3DES, AES, and RC4 are some of the well-known examples of the symmetric encryption algorithm....
2 Pages (500 words) Case Study

Encryption of Data at Rest and in Transit - OpenSSL and Disk Utility

Encryption in the field of computer security is a process that allows users to encode their data using a certain key or a certain algorithm.... Through the use of encryption a user is able to enhance the security of his or her data.... The paper "Encryption of Data at Rest and in Transit - OpenSSL and Disk Utility " states that encryption software and applications such as OpenSSL and Disk Utility encrypt data with complex keys in much smaller time making sure that deciphering texts is much more difficult for an unauthorized user....
9 Pages (2250 words) Essay

Security in Computing

… The paper "security in Computing" is a wonderful example of an assignment on information technology.... Confidentiality, integrity, and availability (CIA) are the major principles that need to be considered while designing security policies in order to counteract security threats for instance interruption, interception, fabrication, and modification.... The paper "security in Computing" is a wonderful example of an assignment on information technology....
6 Pages (1500 words) Assignment

Data and Computer Communications - The Issue of Security

… The paper "Data and Computer Communications - The Issue of security" is a delightful example of an assignment on information technology.... The paper "Data and Computer Communications - The Issue of security" is a delightful example of an assignment on information technology.... It is obvious to expect that the security necessities of a wireless system will include addressing this distress (Curtin, 2005).... Integrity, with reference to data and network security, is the guarantee that information can only be accessed or effect changes by those endorsed to do so....
6 Pages (1500 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us