Online citations, reference lists, and bibliographies.

Data Encryption Standard (DES)

A. Biryukov, C. D. Cannière
Published 2005 · Computer Science

Cite This
Download PDF
Analyze on Scholarcy
Share
We will be looking at 3 industrial-strength encryption algorithms. The first encryption algorithm is called DES for data encryption standard. This standard was designed to encipher sensitive but non-classified data. It is bit oriented and uses both transposition and substitution. It is sometimes referred to as a product cipher. Its input, output, and encryption key are each 64 bits long. The set of 64 bits are referred to as blocks. This is a symmetric key encryption method.
This paper references
10.1007/3-540-45537-X_16
On the Complexity of Matsui's Attack
P. Junod (2001)
10.1007/3-540-48658-5_1
The First Experimental Cryptanalysis of the Data Encryption Standard
M. Matsui (1994)
FIPS-46-3: Data Encryption Standard (DES)
(1999)
10.1007/3-540-44706-7_18
A Chosen-Plaintext Linear Attack on DES
L. Knudsen (2000)
10.1007/3-540-48071-4_36
DES is not a Group
K. W. Campbell (1992)
10.1007/3-540-69710-1_16
Attacking Triple Encryption
S. Lucks (1998)
10.1007/3-540-38424-3
Advances in Cryptology-CRYPTO’ 90
A. Menezes (2001)
10.1007/3-540-38424-3_46
The FEAL Cipher Family
S. Miyaguchi (1990)
Differential cryptanalysis of DESlike cryptosystems
A. Shamir (1993)
10.1007/3-540-46877-3_29
A Known Plaintext Attack on Two-Key Triple Encryption
P. V. Oorschot (1990)
10.1007/BFb0000451
How to Strengthen DES Using Existing Hardware
E. Biham (1994)
10.1007/BF00204799
Pairs and triplets of DES S-boxes
D. Davies (2004)
10.1007/3-540-38424-3_1
Differential Cryptanalysis of DES-like Cryptosystems
E. Biham (1990)
Is the data encryption standard a group
B. Kaliski (1986)
The design of Lucifer: A cryptographic device for data communica-tions
J. L. Smith (1971)
10.1007/3-540-47555-9_7
A New Method for Known Plaintext Attack of FEAL Cipher
M. Matsui (1992)
10.1007/3-540-48285-7_33
Linear Cryptanalysis Method for DES Cipher
M. Matsui (1993)
10.1007/s001459900044
Two-Key Triple Encryption
I. Damgård (1998)
10.1038/scientificamerican0573-15
Cryptography and Computer Privacy
H. Feistel (1973)
Exhaustive cryptanalysis of the NBS data encryption standard
W Diffie (1997)
10.1007/3-540-68697-5_20
How to Protect DES Against Exhaustive Key Search
J. Kilian (1996)
10.1147/rd.383.0243
The Data Encryption Standard (DES) and its strength against attacks
D. Coppersmith (1994)
10.1145/358699.358718
On the security of multiple encryption
R. Merkle (1981)
Subject : DES and differential cryptanalysis
A. Shimizu (1986)
Subject: DES and differential cryptanalysis
Crypt (1992)
10.1007/3-540-39118-5_24
Fast Data Encipherment Algorithm FEAL
A. Shimizu (1987)
10.1007/0-387-34805-0_59
The FEAL-8 Cryptosystem and a Call for Attack
S. Miyaguchi (1989)
Electronic Frontier Foundation (EFF), " DES cracker
(1998)
10.1007/3-540-47721-7_2
Cycle Structures of the DES with Weak and Semi-Weak Keys
J. H. Moore (1986)
10.1007/978-1-4613-9314-6
Differential Cryptanalysis of the Data Encryption Standard
E. Biham (1993)
Results of an initial attempt to cryptanalyze the nbs data encryption standard
M. Hellman (1976)
10.1007/3-540-39799-X_43
The Importance of "Good" Key Scheduling Schemes (How to Make a Secure DES Scheme with <= 48 Bit Keys)
J. Quisquater (1985)
10.1137/0129051
Generators for Certain Alternating Groups with Applications to Cryptography
D. Coppersmith (1975)
10.1007/3-540-45539-6_41
Advanced Slide Attacks
A. Biryukov (2000)
Efficient des key search Practical Cryptography for Data Internetworks
M Wiener (1996)
10.1007/BFb0053451
On Correlation Between the Order of S-boxes and the Strength of DES
M. Matsui (1994)
10.1007/978-1-4757-0602-4_30
Long Key Variants of DES
T. Berson (1982)
10.1007/s001459900027
An improvement of Davies’ attack on DES
E. Biham (2007)



This paper is referenced by
10.1109/ICINFA.2011.5949033
The research and design of ATM PIN Pad based on triple DES
Wanping Wu (2011)
10.1109/RTCSA.2005.55
FPGA-based content protection system for embedded consumer electronics
H. Yokoyama (2005)
10.1117/12.2540017
Analysis of the effects of scrambling and diffusion of logistic chaotic map on image encryption
Fangzheng Zhao (2019)
A Robust Digital Watermarking System Adopting 2D Barcode against Digital Piracy on P2P Network
Euihyun Jung (2006)
10.6688/JISE.2013.29.5.6
Finding Near-Optimum Message Scheduling Settings for SHA-256 Variants Using Genetic Algorithms
Chu-Hsing Lin (2013)
A Review Paper on Encryption Techniques
S. K. Mandal (2019)
10.1287/msom.1070.0167
An Approach to Securely Identifying Beneficial Collaboration in Decentralized Logistics Systems
C. Clifton (2008)
10.1109/TC.2011.251
Parallel AES Encryption Engines for Many-Core Processor Arrays
Bin Liu (2013)
10.1109/ICCCE.2008.4580826
Secure data communication using blind source separation
A. Kumar (2008)
10.14569/IJACSA.2012.031218
A Novel Block Cipher Involving a Key bunch Matrix and a Key-based Permutation and Substitution
V. U. K. Sastry (2012)
10.1109/TIFS.2016.2516905
A Framework for the Analysis and Evaluation of Algebraic Fault Attacks on Lightweight Block Ciphers
F. Zhang (2016)
10.1145/3321705.3329858
Examining DES-based Cipher Suite Support within the TLS Ecosystem
Vanessa Frost (2019)
10.1109/CICN.2010.113
Design an Improved Encrypting Key Pad Using AVR-ATXMEGA Microcontroller
Nader Vahdani Manaf (2010)
GENERATING TERNARY SIMPLEX CODES ARISING FROM COMPLEX HADAMARD MATRICES
Chandradeo Prasad (2015)
10.1109/KINGN.2008.4542251
A self-encryption based private storage system over P2P distributed file sharing infrastructure
H. Eiido (2008)
10.1007/s10009-015-0379-9
Many-core on-the-fly model checking of safety properties using GPUs
Anton Wijs (2015)
10.1145/2108616.2108633
A technique of embedding digital data in an image compression code reversibly
C. Chang (2010)
10.1109/CCST.2003.1297622
Fast implementation of AES cryptographic algorithms in smart cards
Chi-Feng Lu (2003)
10.5121/IJCNC.2013.5510
A NOVEL SECURE E -CONTENTS SYSTEM FOR MULTI -MEDIA INTERCHANGE WORKFLOWS IN E- LEARNING ENVIRONMENTS
Shadi R. Masadeh (2013)
10.1109/AISP.2015.7123493
An efficient hardware implementation of few lightweight block cipher
Ali Nemati (2015)
FPGA Implementation of the Pipelined Data Encryption Standard (DES) Based on Variable Time Data Permutation
Khaled Abd El-Latif (2010)
10.1007/978-3-642-25821-3_22
Co-managing Software and Hardware Modules through the Juggle Middleware
Jan S. Rellermeyer (2011)
10.1145/3078468.3078480
SafeFS: a modular architecture for secure user-space file systems: one FUSE to rule them all
Rogério Pontes (2017)
An Efficient Image Encryption Method Based on Genetic Algorithm
A. Bal (2018)
10.5120/8836-3061
A Novel Block Cipher Involving a Key Bunch Matrix
V. Sastry (2012)
10.1109/TVLSI.2005.863188
An area-efficient universal cryptography processor for smart cards
Y. Eslami (2006)
10.7790/ajtde.v1n1.4
Cybersecurity threats in cloud computing
Julian Jang-Jaccard (2013)
High Speed Software Driven AES Algorithm on IC Smartcards
Chi-Feng Lu (2004)
A Systematic Technical Survey Of Lightweight Cryptography On Iot Environment
Abdulrazzaq H. A. Al-ahdal (2020)
10.1109/GLOCOM.2006.285
NIS05-1: Performance Analysis of Advanced Encryption Standard (AES)
Yang Xiao (2006)
10.11591/IJECE.V9I5.PP3843-3849
Data storage lock algorithm with cryptographic techniques
L AnithaK (2019)
Design of a Data Encryption Test-Bed Used to Analyze Encryption Processing Overhead
Swarna Rekha Manchikatla (2016)
See more
Semantic Scholar Logo Some data provided by SemanticScholar