{"id":1371,"date":"2020-04-21T17:34:05","date_gmt":"2020-04-21T12:04:05","guid":{"rendered":"https:\/\/binaryterms.com\/?p=1371"},"modified":"2021-01-18T11:51:28","modified_gmt":"2021-01-18T06:21:28","slug":"data-encryption-standard-des","status":"publish","type":"post","link":"https:\/\/binaryterms.com\/data-encryption-standard-des.html","title":{"rendered":"Data Encryption Standard (DES)"},"content":{"rendered":"<p><strong>Data Encryption Standard (DES)<\/strong> is the <strong>symmetric block<\/strong> cipher which encrypts a <strong>64-bit plain text<\/strong> in a <strong>64-bit ciphertext<\/strong>. The DES was introduced by the National Institute of Standard and Technology (NIST) in the 1970s. Initially, DES was only used in financial applications but later it was accepted as the cryptographic algorithm by other organizations too.<\/p>\n<p>Being a symmetric cipher the same key is used in encryption and decryption process of DES. In this context, we will discuss the steps performed in DES and we will also discuss the advantages and disadvantages of DES.<\/p>\n<h2>Content: Data Encryption Standard (DES)<\/h2>\n<ol>\n<li><a href=\"#DESDefinition\">DES Definition<\/a><\/li>\n<li><a href=\"#RoundsofDES\">Rounds of DES<\/a><\/li>\n<li><a href=\"#AdvantagesandDisadvantages\">Advantages and Disadvantages<\/a><\/li>\n<li><a href=\"#KeyTakeaways\">Key Takeaways<\/a><\/li>\n<\/ol>\n<p><a name=\"DESDefinition\"><\/a><\/p>\n<h3>DES Definition<\/h3>\n<p>Data Encryption Standard is a <strong>symmetric block cipher<\/strong> which takes the input of 64-bit plain text along with 64-bit key and process it, to generate the 64-bit ciphertext. The diagram below illustrates the working of DES. We will discuss its step in brief.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1377\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg\" alt=\"DES\" width=\"552\" height=\"472\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg 552w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES-300x257.jpg 300w\" sizes=\"auto, (max-width: 552px) 100vw, 552px\" \/><\/p>\n<p><strong>Encryption<\/strong><\/p>\n<p><strong>Step 1:<\/strong> In the first step the 64-bit plain text undergoes <strong>initial permutation<\/strong> which rearranges the bits to produce two 32-bit permuted block which is called left plain text<strong> (LPT 32-bit)<\/strong> and right plain text<strong> (RPT 32-bit)<\/strong>.<\/p>\n<p><strong>Step 2:<\/strong> Now, <strong>16 rounds<\/strong> of DES encryption will be performed on this LPT and RPT\u00a0with a <strong>56-bit key<\/strong>.<\/p>\n<p><strong>Step 3:<\/strong> After the 16<sub>th<\/sub> round the 32-bit LPT and 32-bit RPT are integrated which forms a 64-bit block again and then the final permutation is applied to this 64-bit block, to obtain the 64-bit ciphertext.<\/p>\n<p><strong>Decryption<\/strong><\/p>\n<p>The same Data Encryption Standard algorithm used for encrypting the plain text is also used to decrypting the ciphertext. But the algorithm is reversed, such as the initial and final permutation events are reversed. Even the sequence of the subkeys applied in 16 rounds of DES are also reversed.<br \/>\n<a name=\"RoundsofDES\"><\/a><\/p>\n<h3>Rounds in Data Encryption Standard<\/h3>\n<p>Now, we will discuss the process that takes place during the 16 rounds of DES algorithm. Each round of DES performs the same function. So, below are the steps of the function performed in each round of DES algorithm:<\/p>\n<ol>\n<li>Key Transformation<\/li>\n<li>Expansion Permutation<\/li>\n<li>S-box Substitution<\/li>\n<li>P-box Permutation<\/li>\n<li>XOR and Swap<\/li>\n<\/ol>\n<p><strong>1. Key Transformation<\/strong><\/p>\n<p>Earlier we have discussed that the initial key size is 64-bit which is reduced to the 56-bit key. This is done by discarding every 8<sub>th <\/sub>bit from the 64-bit key. So, for each round of DES, this 56-bit key is used. In the key transformation step, this 56-bit is transformed to the 48-bit key. Let\u2019s see how?<\/p>\n<p>The <strong>56-bit key is split into two halves.<\/strong> Each half is of <strong>28-bit<\/strong>. Now, a <strong>left circular shift<\/strong> is implemented on both the halves which shift the bits in two halves by one or two positions depending on the order of the round.<\/p>\n<p>If the round number is 1, 2, 9, 16 then the left circular shift is done by one position else, if any other order number is encountered the circular shift is done by two positions.<\/p>\n<p>After the left circular shift both the 28-bit halves are integrated and <strong>permutation<\/strong> is performed on a 56-bit key. And from this permuted 56-bit key <strong>48-bit subkey<\/strong> is selected. As the key transformation step involves permutation along with compression of the 56-bit key to 48-bit subkey it is also called <strong>compression permutation<\/strong>.<\/p>\n<p>Thus, the key transformation step provides a different 48-bit subkey for each round of DES.<\/p>\n<p><strong>2. Expansion Permutation<\/strong><\/p>\n<p>In the first step of encryption, during the initial permutation of DES, the 64-bit plain text is permuted and we have 32-bit LPT and 32-bit RPT. Now, the <strong>expansion permutation<\/strong> is performed on the <strong>32-bit RPT<\/strong> which transforms it from <strong>32-bit to 48-bit<\/strong>. The 32-bit LPT is untouched during the process.<\/p>\n<p>For expansion, the 32-bit RPT is divided <strong>8 blocks<\/strong>, where each block is of <strong>4-bit<\/strong>. Each block of 4-bit is expanded to block of 6-bit as you can see in the image below. The extreme two bits of the block are repeated and the middle two-bits is passed on as it is.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1378\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Expansion-Permutation.jpg\" alt=\"Expansion Permutation\" width=\"600\" height=\"242\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Expansion-Permutation.jpg 600w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Expansion-Permutation-300x121.jpg 300w\" sizes=\"auto, (max-width: 600px) 100vw, 600px\" \/><\/p>\n<p>After expansion, now the 48-bit RPT is XORed with the 48-bit key and the resultant 48-bit block is transferred to S-box substitution.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1385\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Expansion-Permutation-DES.jpg\" alt=\"Expansion Permutation DES\" width=\"467\" height=\"332\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Expansion-Permutation-DES.jpg 467w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/Expansion-Permutation-DES-300x213.jpg 300w\" sizes=\"auto, (max-width: 467px) 100vw, 467px\" \/><\/p>\n<p><strong>3. S-box Substitution<\/strong><\/p>\n<p>The input to S-box is 48-bit resultant block of expansion permutation. In S-box substitution, the input 48-bit block is transformed to 32-bit block but the question is how?<\/p>\n<p>The <strong>48-bit input block<\/strong> to S-box substitution is divided into <strong>8 blocks of 6-bit each<\/strong> and is provided as input to 8 substitution boxes also called <strong>S-boxes<\/strong>. Each s-box has an input of 6-bit and its <strong>outputs 4-bit<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1379\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/S-box-Substitution.jpg\" alt=\"S box Substitution\" width=\"543\" height=\"172\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/S-box-Substitution.jpg 543w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/S-box-Substitution-300x95.jpg 300w\" sizes=\"auto, (max-width: 543px) 100vw, 543px\" \/><\/p>\n<p>Each S-box is considered as the table which has <strong>4 rows<\/strong> 0-3 and <strong>16 columns<\/strong> i.e. 0-15. Why 4 rows and 16 columns? Because from the <strong>6-bit input<\/strong> to <strong>s-box<\/strong> the <strong>two extreme bits<\/strong> are used to determine the number of <strong>rows<\/strong>.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1380\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/s-box.jpg\" alt=\"s-box\" width=\"200\" height=\"181\" \/><\/p>\n<p>2 bits can form 4 combinations of 0s and 1s:<\/p>\n<p>2<sup>2 <\/sup>= 4 rows<\/p>\n<p>The middle 4 bits are used to determine the number of columns<\/p>\n<p>4<sup>2 <\/sup>= 16 columns<\/p>\n<p>Now, we will see how the 6-bit input is transformed to the 4-bit output. For example, in the figure above you can see that input bit, at position 1 and 6 i.e. \u201810\u2019 that represent 2 which determines <strong>2<sup>nd<\/sup> row<\/strong> and middle 4 bits i.e. \u20180110\u2019 that represent 6 which determines the <strong>6<sup>th<\/sup> column<\/strong> of s-box. The value at the intersection of the 2<sup>nd<\/sup> row and 6<sup>th<\/sup> column will represent the 4-bit output of corresponding s-box.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1381\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/S-box-table.jpg\" alt=\"S box table\" width=\"589\" height=\"203\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/S-box-table.jpg 589w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/S-box-table-300x103.jpg 300w\" sizes=\"auto, (max-width: 589px) 100vw, 589px\" \/><\/p>\n<p>In our example, the intersection of the 2<sup>nd<\/sup> row and 6<sup>th<\/sup> column is 13 its <strong>4bit representation<\/strong> is <strong>1101<\/strong>. So, the output of S-box 1 is 1101.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1380\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/s-box.jpg\" alt=\"s-box\" width=\"200\" height=\"181\" \/><\/p>\n<p>Similarly, the remaining S-boxes function will be carried out to find the remaining 4-bit outputs. \u00a0In this way, the 8 s-boxes would generate 8, 4-bit output blocks which when integrated forms 32-bit output.<\/p>\n<p><strong>4. P-box Permutation<\/strong><\/p>\n<p>The 32-bit output obtained from s-box substitution is provided as an input to P-box. Here, the 32-bit input is simply permuted and send to the next step.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1403\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/s-box-to-p-box-transfer-des.jpg\" alt=\"s-box to p-box transfer des\" width=\"121\" height=\"103\" \/><\/p>\n<p><strong>5. XOR and Swap<\/strong><\/p>\n<p>As you can observe so far, we have been operating on the 32-bit RPT of the initial 64-bit plain text. The 32-bit LPT is still untouched. In this step, the 32-bit LPT of the initial 64-bit plain text is<strong> XOR<\/strong> with the output of P-box permutation.<\/p>\n<p>The result of the XOR is the new RPT for next round and the old RPT is swapped with LPT. S So, the old RPT is now new LPT for next round. o, the old RPT is now new LPT for next round.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-1405\" src=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/XOR-and-Swap-of-blocks.jpg\" alt=\"XOR and Swap of blocks\" width=\"322\" height=\"415\" srcset=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/XOR-and-Swap-of-blocks.jpg 322w, https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/XOR-and-Swap-of-blocks-233x300.jpg 233w\" sizes=\"auto, (max-width: 322px) 100vw, 322px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>So, here the process of a single round ends and next round start which has the same function.<\/p>\n<p>After 16 such rounds, the output of the 16<sup>th<\/sup> round undergoes <strong>final permutation<\/strong>. The result of this final permutation is 64-bit ciphertext.<br \/>\n<a name=\"AdvantagesandDisadvantages\"><\/a><\/p>\n<h3>Advantages and Disadvantages of DES<\/h3>\n<ol>\n<li>DES has a 56-bit key which raises the possibility of 2<sup>56<\/sup> possible keys which make brute force impossible.<\/li>\n<li>The 8 S-boxes used in each round were not made public and even it impossible for any to discover the design of the s-boxes which makes the attack more impossible.<\/li>\n<li>The number of rounds in DES increases the complexity of the algorithm.<\/li>\n<li>However, the cryptanalysis attack is easier than the brute force attack on DES.<\/li>\n<\/ol>\n<p><a name=\"KeyTakeaways\"><\/a><\/p>\n<h3>Key Takeaways<\/h3>\n<div id=\"keytake\">\n<ul>\n<li>DES is a symmetric block cipher.<\/li>\n<li>DES encrypts 64-bit plain text to 64-bit cipher text.<\/li>\n<li>DES uses a 56-bit key for encryption.<\/li>\n<li>Encryption and decryption algorithm is the same in DES. But, the procedure of encryption is reversed while decryption.<\/li>\n<li>16 rounds in DES strengthens the algorithm.<\/li>\n<li>Each round has the same function which involves key transformation, expansion permutation, s-box substitution, p-box permutation and XOR and swapping.<\/li>\n<\/ul>\n<\/div>\n<p>So, this is all about the DES block cipher. In 2001 the NIST has published <strong>Advanced Encryption Standard<\/strong> (AES) to replace DES. Because DES was meant for the hardware and its relatively slow performance on software leads to its replacement.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Data Encryption Standard (DES) is the symmetric block cipher which encrypts a 64-bit plain text in a 64-bit ciphertext. The DES was introduced by the National Institute of Standard and Technology (NIST) in the 1970s. Initially, DES was only used in financial applications but later it was accepted as the cryptographic algorithm by other organizations [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_genesis_hide_title":false,"_genesis_hide_breadcrumbs":false,"_genesis_hide_singular_image":false,"_genesis_hide_footer_widgets":false,"_genesis_custom_body_class":"","_genesis_custom_post_class":"","_genesis_layout":"","footnotes":""},"categories":[9],"tags":[],"class_list":{"0":"post-1371","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-security","7":"entry"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v26.6 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>What is Data Encryption Standard (DES)? Definition, Working, Advantages and Disadvantages - Binary Terms<\/title>\n<meta name=\"description\" content=\"Data Encryption Standard (DES) is the symmetric block cipher which encrypts a 64-bit plain text in a 64-bit ciphertext. The DES was introduced by the National Institute of Standard and Technology in the 1970s.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/binaryterms.com\/data-encryption-standard-des.html\" \/>\n<meta property=\"og:locale\" content=\"en_GB\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"What is Data Encryption Standard (DES)? Definition, Working, Advantages and Disadvantages - Binary Terms\" \/>\n<meta property=\"og:description\" content=\"Data Encryption Standard (DES) is the symmetric block cipher which encrypts a 64-bit plain text in a 64-bit ciphertext. The DES was introduced by the National Institute of Standard and Technology in the 1970s.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/binaryterms.com\/data-encryption-standard-des.html\" \/>\n<meta property=\"og:site_name\" content=\"Binary Terms\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-21T12:04:05+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2021-01-18T06:21:28+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg\" \/>\n<meta name=\"author\" content=\"Neha T\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Neha T\" \/>\n\t<meta name=\"twitter:label2\" content=\"Estimated reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html#article\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html\"},\"author\":{\"name\":\"Neha T\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\"},\"headline\":\"Data Encryption Standard (DES)\",\"datePublished\":\"2020-04-21T12:04:05+00:00\",\"dateModified\":\"2021-01-18T06:21:28+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html\"},\"wordCount\":1273,\"commentCount\":2,\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg\",\"articleSection\":[\"Security\"],\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\/\/binaryterms.com\/data-encryption-standard-des.html#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html\",\"url\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html\",\"name\":\"What is Data Encryption Standard (DES)? Definition, Working, Advantages and Disadvantages - Binary Terms\",\"isPartOf\":{\"@id\":\"https:\/\/binaryterms.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html#primaryimage\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html#primaryimage\"},\"thumbnailUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg\",\"datePublished\":\"2020-04-21T12:04:05+00:00\",\"dateModified\":\"2021-01-18T06:21:28+00:00\",\"description\":\"Data Encryption Standard (DES) is the symmetric block cipher which encrypts a 64-bit plain text in a 64-bit ciphertext. The DES was introduced by the National Institute of Standard and Technology in the 1970s.\",\"breadcrumb\":{\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html#breadcrumb\"},\"inLanguage\":\"en-GB\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/binaryterms.com\/data-encryption-standard-des.html\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html#primaryimage\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg\",\"width\":552,\"height\":472,\"caption\":\"DES\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/binaryterms.com\/data-encryption-standard-des.html#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/binaryterms.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Data Encryption Standard (DES)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/binaryterms.com\/#website\",\"url\":\"https:\/\/binaryterms.com\/\",\"name\":\"Binary Terms\",\"description\":\"The Computer Science &amp; IT Guide\",\"publisher\":{\"@id\":\"https:\/\/binaryterms.com\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/binaryterms.com\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-GB\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/binaryterms.com\/#organization\",\"name\":\"Binary Terms\",\"url\":\"https:\/\/binaryterms.com\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-GB\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"contentUrl\":\"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png\",\"width\":400,\"height\":63,\"caption\":\"Binary Terms\"},\"image\":{\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe\",\"name\":\"Neha T\",\"url\":\"https:\/\/binaryterms.com\/author\/author\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"What is Data Encryption Standard (DES)? Definition, Working, Advantages and Disadvantages - Binary Terms","description":"Data Encryption Standard (DES) is the symmetric block cipher which encrypts a 64-bit plain text in a 64-bit ciphertext. The DES was introduced by the National Institute of Standard and Technology in the 1970s.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/binaryterms.com\/data-encryption-standard-des.html","og_locale":"en_GB","og_type":"article","og_title":"What is Data Encryption Standard (DES)? Definition, Working, Advantages and Disadvantages - Binary Terms","og_description":"Data Encryption Standard (DES) is the symmetric block cipher which encrypts a 64-bit plain text in a 64-bit ciphertext. The DES was introduced by the National Institute of Standard and Technology in the 1970s.","og_url":"https:\/\/binaryterms.com\/data-encryption-standard-des.html","og_site_name":"Binary Terms","article_published_time":"2020-04-21T12:04:05+00:00","article_modified_time":"2021-01-18T06:21:28+00:00","og_image":[{"url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg","type":"","width":"","height":""}],"author":"Neha T","twitter_card":"summary_large_image","twitter_misc":{"Written by":"Neha T","Estimated reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html#article","isPartOf":{"@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html"},"author":{"name":"Neha T","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe"},"headline":"Data Encryption Standard (DES)","datePublished":"2020-04-21T12:04:05+00:00","dateModified":"2021-01-18T06:21:28+00:00","mainEntityOfPage":{"@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html"},"wordCount":1273,"commentCount":2,"publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"image":{"@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg","articleSection":["Security"],"inLanguage":"en-GB","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/binaryterms.com\/data-encryption-standard-des.html#respond"]}]},{"@type":"WebPage","@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html","url":"https:\/\/binaryterms.com\/data-encryption-standard-des.html","name":"What is Data Encryption Standard (DES)? Definition, Working, Advantages and Disadvantages - Binary Terms","isPartOf":{"@id":"https:\/\/binaryterms.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html#primaryimage"},"image":{"@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html#primaryimage"},"thumbnailUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg","datePublished":"2020-04-21T12:04:05+00:00","dateModified":"2021-01-18T06:21:28+00:00","description":"Data Encryption Standard (DES) is the symmetric block cipher which encrypts a 64-bit plain text in a 64-bit ciphertext. The DES was introduced by the National Institute of Standard and Technology in the 1970s.","breadcrumb":{"@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html#breadcrumb"},"inLanguage":"en-GB","potentialAction":[{"@type":"ReadAction","target":["https:\/\/binaryterms.com\/data-encryption-standard-des.html"]}]},{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html#primaryimage","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/04\/DES.jpg","width":552,"height":472,"caption":"DES"},{"@type":"BreadcrumbList","@id":"https:\/\/binaryterms.com\/data-encryption-standard-des.html#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/binaryterms.com\/"},{"@type":"ListItem","position":2,"name":"Data Encryption Standard (DES)"}]},{"@type":"WebSite","@id":"https:\/\/binaryterms.com\/#website","url":"https:\/\/binaryterms.com\/","name":"Binary Terms","description":"The Computer Science &amp; IT Guide","publisher":{"@id":"https:\/\/binaryterms.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/binaryterms.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-GB"},{"@type":"Organization","@id":"https:\/\/binaryterms.com\/#organization","name":"Binary Terms","url":"https:\/\/binaryterms.com\/","logo":{"@type":"ImageObject","inLanguage":"en-GB","@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/","url":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","contentUrl":"https:\/\/binaryterms.com\/wp-content\/uploads\/2020\/05\/binary-terms-logo1.png","width":400,"height":63,"caption":"Binary Terms"},"image":{"@id":"https:\/\/binaryterms.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/binaryterms.com\/#\/schema\/person\/e495f1d57f5c0a4c521cc3dba95661fe","name":"Neha T","url":"https:\/\/binaryterms.com\/author\/author"}]}},"_links":{"self":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/comments?post=1371"}],"version-history":[{"count":1,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1371\/revisions"}],"predecessor-version":[{"id":2217,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/posts\/1371\/revisions\/2217"}],"wp:attachment":[{"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/media?parent=1371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/categories?post=1371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/binaryterms.com\/wp-json\/wp\/v2\/tags?post=1371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}