This page uses content from Wikipedia and is licensed under CC BYSA.
The Feistel function (F function) of DES


General  

Designers  IBM 
First published  1975 (Federal Register) (standardized in January 1977) 
Derived from  Lucifer 
Successors  Triple DES, GDES, DESX, LOKI89, ICE 
Cipher detail  
Key sizes  56 bits (+8 parity bits) 
Block sizes  64 bits 
Structure  Balanced Feistel network 
Rounds  16 
Best public cryptanalysis  
DES is now considered insecure because a bruteforce attack is possible (see EFF DES cracker). As of 2008, the best analytical attack is linear cryptanalysis, which requires 2^{43} known plaintexts and has a time complexity of 2^{39–43} (Junod, 2001). 
The Data Encryption Standard (DES, /ˌdiːˌiːˈɛs, dɛz/) is a symmetrickey algorithm for the encryption of electronic data. Although now considered insecure, it was highly influential in the advancement of modern cryptography.
Developed in the early 1970s at IBM and based on an earlier design by Horst Feistel, the algorithm was submitted to the National Bureau of Standards (NBS) following the agency's invitation to propose a candidate for the protection of sensitive, unclassified electronic government data. In 1976, after consultation with the National Security Agency (NSA), the NBS eventually selected a slightly modified version (strengthened against differential cryptanalysis, but weakened against bruteforce attacks), which was published as an official Federal Information Processing Standard (FIPS) for the United States in 1977.
The publication of an NSAapproved encryption standard simultaneously resulted in its quick international adoption and widespread academic scrutiny. Controversies arose out of classified design elements, a relatively short key length of the symmetrickey block cipher design, and the involvement of the NSA, nourishing suspicions about a backdoor. The intense academic scrutiny the algorithm received over time led to the modern understanding of block ciphers and their cryptanalysis.
DES is now considered to be insecure for many applications. This is mainly due to the 56bit key size being too small. In January 1999, distributed.net and the Electronic Frontier Foundation collaborated to publicly break a DES key in 22 hours and 15 minutes (see chronology). There are also some analytical results which demonstrate theoretical weaknesses in the cipher, although they are infeasible to mount in practice. The algorithm is believed to be practically secure in the form of Triple DES, although there are theoretical attacks. This cipher has been superseded by the Advanced Encryption Standard (AES). Furthermore, DES has been withdrawn as a standard by the National Institute of Standards and Technology.
Some documentation makes a distinction between DES as a standard and as an algorithm, referring to the algorithm as the DEA (Data Encryption Algorithm).
The origins of DES go back to the early 1970s. In 1972, after concluding a study on the US government's computer security needs, the US standards body NBS (National Bureau of Standards)—now named NIST (National Institute of Standards and Technology)—identified a need for a governmentwide standard for encrypting unclassified, sensitive information.^{[1]} Accordingly, on 15 May 1973, after consulting with the NSA, NBS solicited proposals for a cipher that would meet rigorous design criteria. None of the submissions, however, turned out to be suitable. A second request was issued on 27 August 1974. This time, IBM submitted a candidate which was deemed acceptable—a cipher developed during the period 1973–1974 based on an earlier algorithm, Horst Feistel's Lucifer cipher. The team at IBM involved in cipher design and analysis included Feistel, Walter Tuchman, Don Coppersmith, Alan Konheim, Carl Meyer, Mike Matyas, Roy Adler, Edna Grossman, Bill Notz, Lynn Smith, and Bryant Tuckerman.
On 17 March 1975, the proposed DES was published in the Federal Register. Public comments were requested, and in the following year two open workshops were held to discuss the proposed standard. There was some criticism from various parties, including from publickey cryptography pioneers Martin Hellman and Whitfield Diffie,^{[2]} citing a shortened key length and the mysterious "Sboxes" as evidence of improper interference from the NSA. The suspicion was that the algorithm had been covertly weakened by the intelligence agency so that they—but noone else—could easily read encrypted messages.^{[3]} Alan Konheim (one of the designers of DES) commented, "We sent the Sboxes off to Washington. They came back and were all different."^{[4]} The United States Senate Select Committee on Intelligence reviewed the NSA's actions to determine whether there had been any improper involvement. In the unclassified summary of their findings, published in 1978, the Committee wrote:
In the development of DES, NSA convinced IBM that a reduced key size was sufficient; indirectly assisted in the development of the Sbox structures; and certified that the final DES algorithm was, to the best of their knowledge, free from any statistical or mathematical weakness.^{[5]}
However, it also found that
NSA did not tamper with the design of the algorithm in any way. IBM invented and designed the algorithm, made all pertinent decisions regarding it, and concurred that the agreed upon key size was more than adequate for all commercial applications for which the DES was intended.^{[6]}
Another member of the DES team, Walter Tuchman, stated "We developed the DES algorithm entirely within IBM using IBMers. The NSA did not dictate a single wire!"^{[7]} In contrast, a declassified NSA book on cryptologic history states:
In 1973 NBS solicited private industry for a data encryption standard (DES). The first offerings were disappointing, so NSA began working on its own algorithm. Then Howard Rosenblum, deputy director for research and engineering, discovered that Walter Tuchman of IBM was working on a modification to Lucifer for general use. NSA gave Tuchman a clearance and brought him in to work jointly with the Agency on his Lucifer modification."^{[8]}
and
NSA worked closely with IBM to strengthen the algorithm against all except bruteforce attacks and to strengthen substitution tables, called Sboxes. Conversely, NSA tried to convince IBM to reduce the length of the key from 64 to 48 bits. Ultimately they compromised on a 56bit key.^{[9]}^{[10]}
Some of the suspicions about hidden weaknesses in the Sboxes were allayed in 1990, with the independent discovery and open publication by Eli Biham and Adi Shamir of differential cryptanalysis, a general method for breaking block ciphers. The Sboxes of DES were much more resistant to the attack than if they had been chosen at random, strongly suggesting that IBM knew about the technique in the 1970s. This was indeed the case; in 1994, Don Coppersmith published some of the original design criteria for the Sboxes.^{[11]} According to Steven Levy, IBM Watson researchers discovered differential cryptanalytic attacks in 1974 and were asked by the NSA to keep the technique secret.^{[12]} Coppersmith explains IBM's secrecy decision by saying, "that was because [differential cryptanalysis] can be a very powerful tool, used against many schemes, and there was concern that such information in the public domain could adversely affect national security." Levy quotes Walter Tuchman: "[t]hey asked us to stamp all our documents confidential... We actually put a number on each one and locked them up in safes, because they were considered U.S. government classified. They said do it. So I did it".^{[12]} Bruce Schneier observed that "It took the academic community two decades to figure out that the NSA 'tweaks' actually improved the security of DES."^{[13]}
Despite the criticisms, DES was approved as a federal standard in November 1976, and published on 15 January 1977 as FIPS PUB 46, authorized for use on all unclassified data. It was subsequently reaffirmed as the standard in 1983, 1988 (revised as FIPS461), 1993 (FIPS462), and again in 1999 (FIPS463), the latter prescribing "Triple DES" (see below). On 26 May 2002, DES was finally superseded by the Advanced Encryption Standard (AES), following a public competition. On 19 May 2005, FIPS 463 was officially withdrawn, but NIST has approved Triple DES through the year 2030 for sensitive government information.^{[14]}
The algorithm is also specified in ANSI X3.92 (Now, X3 is now known as INCITS and ANSI X3.92 as ANSI INCITS 92),^{[15]} NIST SP 80067^{[14]} and ISO/IEC 180333^{[16]} (as a component of TDEA).
Another theoretical attack, linear cryptanalysis, was published in 1994, but it was the Electronic Frontier Foundation's DES cracker in 1998 that demonstrated that DES could be attacked very practically, and highlighted the need for a replacement algorithm. These and other methods of cryptanalysis are discussed in more detail later in this article.
The introduction of DES is considered to have been a catalyst for the academic study of cryptography, particularly of methods to crack block ciphers. According to a NIST retrospective about DES,
Date  Year  Event 

15 May  1973  NBS publishes a first request for a standard encryption algorithm 
27 August  1974  NBS publishes a second request for encryption algorithms 
17 March  1975  DES is published in the Federal Register for comment 
August  1976  First workshop on DES 
September  1976  Second workshop, discussing mathematical foundation of DES 
November  1976  DES is approved as a standard 
15 January  1977  DES is published as a FIPS standard FIPS PUB 46 
1983  DES is reaffirmed for the first time  
1986  Videocipher II, a TV satellite scrambling system based upon DES, begins use by HBO  
22 January  1988  DES is reaffirmed for the second time as FIPS 461, superseding FIPS PUB 46 
July  1991  Biham and Shamir rediscover differential cryptanalysis, and apply it to a 15round DESlike cryptosystem. 
1992  Biham and Shamir report the first theoretical attack with less complexity than brute force: differential cryptanalysis. However, it requires an unrealistic 2^{47} chosen plaintexts.  
30 December  1993  DES is reaffirmed for the third time as FIPS 462 
1994  The first experimental cryptanalysis of DES is performed using linear cryptanalysis (Matsui, 1994).  
June  1997  The DESCHALL Project breaks a message encrypted with DES for the first time in public. 
July  1998  The EFF's DES cracker (Deep Crack) breaks a DES key in 56 hours. 
January  1999  Together, Deep Crack and distributed.net break a DES key in 22 hours and 15 minutes. 
25 October  1999  DES is reaffirmed for the fourth time as FIPS 463, which specifies the preferred use of Triple DES, with single DES permitted only in legacy systems. 
26 November  2001  The Advanced Encryption Standard is published in FIPS 197 
26 May  2002  The AES becomes effective 
26 July  2004  The withdrawal of FIPS 463 (and a couple of related standards) is proposed in the Federal Register^{[19]} 
19 May  2005  NIST withdraws FIPS 463 (see Federal Register vol 70, number 96) 
April  2006  The FPGAbased parallel machine COPACOBANA of the Universities of Bochum and Kiel, Germany, breaks DES in 9 days at a $10,000 hardware cost.^{[20]} Within a year software improvements reduced the average time to 6.4 days. 
Nov.  2008  The successor of COPACOBANA, the RIVYERA machine, reduced the average time to less than a single day. 
July  2017  A chosenplaintext attack utilizing a rainbow table can recover the DES key for a single specific chosen plaintext 1122334455667788 in 25 seconds. A new rainbow table has to be calculated per plaintext. A limited set of rainbow tables have been made available for download.^{[21]} 
DES is the archetypal block cipher—an algorithm that takes a fixedlength string of plaintext bits and transforms it through a series of complicated operations into another ciphertext bitstring of the same length. In the case of DES, the block size is 64 bits. DES also uses a key to customize the transformation, so that decryption can supposedly only be performed by those who know the particular key used to encrypt. The key ostensibly consists of 64 bits; however, only 56 of these are actually used by the algorithm. Eight bits are used solely for checking parity, and are thereafter discarded. Hence the effective key length is 56 bits.
The key is nominally stored or transmitted as 8 bytes, each with odd parity. According to ANSI X3.921981 (Now, known as ANSI INCITS 921981), section 3.5:
One bit in each 8bit byte of the KEY may be utilized for error detection in key generation, distribution, and storage. Bits 8, 16,..., 64 are for use in ensuring that each byte is of odd parity.
Like other block ciphers, DES by itself is not a secure means of encryption, but must instead be used in a mode of operation. FIPS81 specifies several modes for use with DES.^{[22]} Further comments on the usage of DES are contained in FIPS74.^{[23]}
Decryption uses the same structure as encryption, but with the keys used in reverse order. (This has the advantage that the same hardware or software can be used in both directions.)
The algorithm's overall structure is shown in Figure 1: there are 16 identical stages of processing, termed rounds. There is also an initial and final permutation, termed IP and FP, which are inverses (IP "undoes" the action of FP, and vice versa). IP and FP have no cryptographic significance, but were included in order to facilitate loading blocks in and out of mid1970s 8bit based hardware.^{[24]}
Before the main rounds, the block is divided into two 32bit halves and processed alternately; this crisscrossing is known as the Feistel scheme. The Feistel structure ensures that decryption and encryption are very similar processes—the only difference is that the subkeys are applied in the reverse order when decrypting. The rest of the algorithm is identical. This greatly simplifies implementation, particularly in hardware, as there is no need for separate encryption and decryption algorithms.
The ⊕ symbol denotes the exclusiveOR (XOR) operation. The Ffunction scrambles half a block together with some of the key. The output from the Ffunction is then combined with the other half of the block, and the halves are swapped before the next round. After the final round, the halves are swapped; this is a feature of the Feistel structure which makes encryption and decryption similar processes.
The Ffunction, depicted in Figure 2, operates on half a block (32 bits) at a time and consists of four stages:
The alternation of substitution from the Sboxes, and permutation of bits from the Pbox and Eexpansion provides socalled "confusion and diffusion" respectively, a concept identified by Claude Shannon in the 1940s as a necessary condition for a secure yet practical cipher.
Figure 3 illustrates the key schedule for encryption—the algorithm which generates the subkeys. Initially, 56 bits of the key are selected from the initial 64 by Permuted Choice 1 (PC1)—the remaining eight bits are either discarded or used as parity check bits. The 56 bits are then divided into two 28bit halves; each half is thereafter treated separately. In successive rounds, both halves are rotated left by one or two bits (specified for each round), and then 48 subkey bits are selected by Permuted Choice 2 (PC2)—24 bits from the left half, and 24 from the right. The rotations (denoted by "<<<" in the diagram) mean that a different set of bits is used in each subkey; each bit is used in approximately 14 out of the 16 subkeys.
The key schedule for decryption is similar—the subkeys are in reverse order compared to encryption. Apart from that change, the process is the same as for encryption. The same 28 bits are passed to all rotation boxes.
Although more information has been published on the cryptanalysis of DES than any other block cipher, the most practical attack to date is still a bruteforce approach. Various minor cryptanalytic properties are known, and three theoretical attacks are possible which, while having a theoretical complexity less than a bruteforce attack, require an unrealistic number of known or chosen plaintexts to carry out, and are not a concern in practice.
For any cipher, the most basic method of attack is brute force—trying every possible key in turn. The length of the key determines the number of possible keys, and hence the feasibility of this approach. For DES, questions were raised about the adequacy of its key size early on, even before it was adopted as a standard, and it was the small key size, rather than theoretical cryptanalysis, which dictated a need for a replacement algorithm. As a result of discussions involving external consultants including the NSA, the key size was reduced from 128 bits to 56 bits to fit on a single chip.^{[25]}
In academia, various proposals for a DEScracking machine were advanced. In 1977, Diffie and Hellman proposed a machine costing an estimated US$20 million which could find a DES key in a single day^{[2]}^{[26]}. By 1993, Wiener had proposed a keysearch machine costing US$1 million which would find a key within 7 hours. However, none of these early proposals were ever implemented—or, at least, no implementations were publicly acknowledged. The vulnerability of DES was practically demonstrated in the late 1990s. In 1997, RSA Security sponsored a series of contests, offering a $10,000 prize to the first team that broke a message encrypted with DES for the contest. That contest was won by the DESCHALL Project, led by Rocke Verser, Matt Curtin, and Justin Dolske, using idle cycles of thousands of computers across the Internet. The feasibility of cracking DES quickly was demonstrated in 1998 when a custom DEScracker was built by the Electronic Frontier Foundation (EFF), a cyberspace civil rights group, at the cost of approximately US$250,000 (see EFF DES cracker). Their motivation was to show that DES was breakable in practice as well as in theory: "There are many people who will not believe a truth until they can see it with their own eyes. Showing them a physical machine that can crack DES in a few days is the only way to convince some people that they really cannot trust their security to DES." The machine bruteforced a key in a little more than 2 days' worth of searching.
The next confirmed DES cracker was the COPACOBANA machine built in 2006 by teams of the Universities of Bochum and Kiel, both in Germany. Unlike the EFF machine, COPACOBANA consists of commercially available, reconfigurable integrated circuits. 120 of these fieldprogrammable gate arrays (FPGAs) of type XILINX Spartan3 1000 run in parallel. They are grouped in 20 DIMM modules, each containing 6 FPGAs. The use of reconfigurable hardware makes the machine applicable to other code breaking tasks as well.^{[27]} One of the more interesting aspects of COPACOBANA is its cost factor. One machine can be built for approximately $10,000.^{[28]} The cost decrease by roughly a factor of 25 over the EFF machine is an example of the continuous improvement of digital hardware—see Moore's law. Adjusting for inflation over 8 years yields an even higher improvement of about 30x. Since 2007, SciEngines GmbH, a spinoff company of the two project partners of COPACOBANA has enhanced and developed successors of COPACOBANA. In 2008 their COPACOBANA RIVYERA reduced the time to break DES to less than one day, using 128 Spartan3 5000's. SciEngines RIVYERA held the record in bruteforce breaking DES, having utilized 128 Spartan3 5000 FPGAs.^{[29]} Their 256 Spartan6 LX150 model has further lowered this time.
In 2012, David Hutton and Moxie Marlinspike announced a system with 48 Xilinx Virtex6 LX240T FPGAs, each FPGA containing 40 fully pipelined DES cores running at 400MHz, for a total capacity of 768 gigakeys/sec. The system can exhaustively search the entire 56bit DES key space in about 26 hours and this service is offered for a fee online.^{[30]}^{[31]}
There are three attacks known that can break the full 16 rounds of DES with less complexity than a bruteforce search: differential cryptanalysis (DC), linear cryptanalysis (LC), and Davies' attack. However, the attacks are theoretical and are unfeasible to mount in practice^{[citation needed]}; these types of attack are sometimes termed certificational weaknesses.
There have also been attacks proposed against reducedround versions of the cipher, that is, versions of DES with fewer than 16 rounds. Such analysis gives an insight into how many rounds are needed for safety, and how much of a "security margin" the full version retains. Differentiallinear cryptanalysis was proposed by Langford and Hellman in 1994, and combines differential and linear cryptanalysis into a single attack. An enhanced version of the attack can break 9round DES with 2^{15.8} chosen plaintexts and has a 2^{29.2} time complexity (Biham and others, 2002).
DES exhibits the complementation property, namely that
where is the bitwise complement of denotes encryption with key and denote plaintext and ciphertext blocks respectively. The complementation property means that the work for a bruteforce attack could be reduced by a factor of 2 (or a single bit) under a chosenplaintext assumption. By definition, this property also applies to TDES cipher.^{[citation needed]}
DES also has four socalled weak keys. Encryption (E) and decryption (D) under a weak key have the same effect (see involution):
There are also six pairs of semiweak keys. Encryption with one of the pair of semiweak keys, , operates identically to decryption with the other, :
It is easy enough to avoid the weak and semiweak keys in an implementation, either by testing for them explicitly, or simply by choosing keys randomly; the odds of picking a weak or semiweak key by chance are negligible. The keys are not really any weaker than any other keys anyway, as they do not give an attack any advantage.
DES has also been proved not to be a group, or more precisely, the set (for all possible keys ) under functional composition is not a group, nor "close" to being a group.^{[33]} This was an open question for some time, and if it had been the case, it would have been possible to break DES, and multiple encryption modes such as Triple DES would not increase the security, because encryption under one key would be equivalent to decryption under another key.^{[citation needed]}
Simplified DES (SDES) was designed for educational purposes only, to help students learn about modern cryptanalytic techniques. SDES has similar properties and structure as DES, but has been simplified to make it much easier to perform encryption and decryption by hand with pencil and paper. Some people feel that learning SDES gives insight into DES and other block ciphers, and insight into various cryptanalytic attacks against them.^{[34]}^{[35]}^{[36]}^{[37]}^{[38]}^{[39]}^{[40]}^{[41]}^{[42]}
Concerns about security and the relatively slow operation of DES in software motivated researchers to propose a variety of alternative block cipher designs, which started to appear in the late 1980s and early 1990s: examples include RC5, Blowfish, IDEA, NewDES, SAFER, CAST5 and FEAL. Most of these designs kept the 64bit block size of DES, and could act as a "dropin" replacement, although they typically used a 64bit or 128bit key. In the Soviet Union the GOST 2814789 algorithm was introduced, with a 64bit block size and a 256bit key, which was also used in Russia later.
DES itself can be adapted and reused in a more secure scheme. Many former DES users now use Triple DES (TDES) which was described and analysed by one of DES's patentees (see FIPS Pub 463); it involves applying DES three times with two (2TDES) or three (3TDES) different keys. TDES is regarded as adequately secure, although it is quite slow. A less computationally expensive alternative is DESX, which increases the key size by XORing extra key material before and after DES. GDES was a DES variant proposed as a way to speed up encryption, but it was shown to be susceptible to differential cryptanalysis.
On January 2, 1997, NIST announced that they wished to choose a successor to DES.^{[43]} In 2001, after an international competition, NIST selected a new cipher, the Advanced Encryption Standard (AES), as a replacement.^{[44]} The algorithm which was selected as the AES was submitted by its designers under the name Rijndael. Other finalists in the NIST AES competition included RC6, Serpent, MARS, and Twofish.
Wikimedia Commons has media related to Data Encryption Standard. 