Data Encryption Standard: past and future

  title={Data Encryption Standard: past and future},
  author={Miles E. Smid and Dennis K. Branstad},
The authors examine the past and future of the Data Encryption Standard (DES), which is the first, and to the present date, only, publicly available cryptographic algorithm that has been endorsed by the US government of the standard during the early 1970s, the controversy regarding the proposed standard during the mid-1970s, the growing acceptance and use of the standard in the 1980s, and some recent developments that could affect its future. > 

Figures from this paper

The DES Algorithm Illustrated
The DES (Data Encryption Standard) algorithm is the most widely used encryption algorithm in the world. For many years, and among many people, "secret code making" and DES have been synonymous. And
The Economic Impacts of NIST's Data Encryption Standard (DES) Program
This report examines the evolution and economic significance of NIST's Data Encryption Standard (DES) Program, developed by the National Institute of Standards and Technology (NIST) for protecting sensitive, unclassified data.
Modern data encryption
  • C. Boyd
  • Computer Science, Mathematics
  • 1993
Asymmetric, or public key, algorithms allow provision of new security services such as digital signatures, but a recently proposed standard for digital signatures is also of intense current interest.
A two-phase encryption scheme for enhancing database security
New design principle for cryptographic modules in computer security systems
Encryption is the most universal, convenient, and reliable method for ensuring data confidentiality and simplifies information acquisition and complicates the legal protection of its confidentiality.
Cryptography-a state of the art review
  • C. H. Meyer
  • Computer Science
    Proceedings. VLSI and Computer Peripherals. COMPEURO 89
  • 1989
The authors gives an overview of cryptographic methods using symmetric and asymmetric algorithms and demonstrates why future cryptographic applications should use a hybrid approach, i.e., combination of asymmetric and symmetric (public key) methods.
This paper studies one of the most important and widely used secret key encryption/decryption algorithms, namely the Advanced Encryption Standard (AES), and proposes a pipelined implementation of the AES algorithm to reduce both computation complexity and elapsed computation time.
Fast Software Encryption Functions
  • R. Merkle
  • Computer Science, Mathematics
  • 1990
A well accepted encryption function for implementation in software is presented here - on a SUN 4/260 it can encrypt at 4 to 8 megabits per second, which will effectively reduce the cost and increase the availability of cryptographic protection.
Implementation of Improved DES Algorithm in Securing Smart Card Data
The Odd-Even substitution proved to have provided additional confusion technique to DES and was essential in providing adequate security, and the limitation of DES to encrypt large data has been addressed by this research without intensive processing.


A Survey of Data Insecurity Packages
Five commercially available encryption packages for the IBM PC are described and broken.
Special Feature Exhaustive Cryptanalysis of the NBS Data Encryption Standard
This paper presents a meta-modelling system that automates the very labor-intensive and therefore time-heavy and expensive process of manually cataloging and cataloging individual pieces of data to provide real-time information about their owners.
Telecommunications: General security requirements for equipment using the data encryption standard,
  • Federal Standard 1027,
  • 1983
Criteria and procedures for testing, evaluating, and certifying message authentication devices for federal E.F.T. use,
  • United States Department of the Treasury,
  • 1986
American national standard for financial institution message encryption
  • American national standard for financial institution message encryption
NSA Deputy Director for Information Security, to Datapro Research Corporation
  • NSA Deputy Director for Information Security, to Datapro Research Corporation
  • 1985