Free

Is DES cipher not security anymore - Essay Example

Comments (0) Cite this document
Summary
This is particularly because DES is a weak, old and broken encryption algorithm that is highly susceptible to brute force attacks (Curtin, Dolske, 1998, p.4). For example, the DES cryptanalysis…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER96.6% of users find it useful
Is DES cipher not security anymore
Read TextPreview

Extract of sample "Is DES cipher not security anymore"

Is DES Cipher not Security Anymore? Insert (s) Is DES Cipher not Security Anymore? I agree with EFF that Data Encryption Standard (DES) cipher is not anymore security. This is particularly because DES is a weak, old and broken encryption algorithm that is highly susceptible to brute force attacks (Curtin, Dolske, 1998, p.4). For example, the DES cryptanalysis carried out by Electronic Frontier Foundation (EFF) in 1998 revealed that given a finite time, DES can easily be cracked by a modestly financed adversary. This is further compounded by the fact that while it may have cost EFF $250,000 to successfully crack DES in 1998, it can now be achieved for a considerably less cost and time.
Although DES are still being used as a means of encryption by many organizations and governments, DES has significantly deprecated and is no longer secure as just anyone with a little technical know-how and time can break into the cryptographic keys. However, this does not mean that DES cipher should never be used all. It only means that it is important to evaluate the value of the information to be protected, both to the attacker and to the owner, and fully grasp the nature of the risks before making the decision to use Data Encryption Standard (DES) cipher. According to Stallings (2006, p.73), DES may still provide security if used in situations involving no real threats such as when encrypting files on a family PC.
In conclusion, in view of the contemporary threats, DES algorithm offers very little deterrence for any determined adversary and should never be considered to be secure. Using more efficient and stronger cryptographic algorithms such as Advanced Encryption Standard (AES) and 3DES among others may provide better security.
References
Curtin, M. & Dolske, J. 1998. A Brute Force Search of DES Keyspace. Available at .
Stallings, W. 2006. Cryptography and network security: principles and practice. New York: Prentice Hall Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Is DES cipher not security anymore Essay Example | Topics and Well Written Essays - 250 words”, n.d.)
Is DES cipher not security anymore Essay Example | Topics and Well Written Essays - 250 words. Retrieved from https://studentshare.org/information-technology/1675628-is-des-cipher-not-security-anymore
(Is DES Cipher Not Security Anymore Essay Example | Topics and Well Written Essays - 250 Words)
Is DES Cipher Not Security Anymore Essay Example | Topics and Well Written Essays - 250 Words. https://studentshare.org/information-technology/1675628-is-des-cipher-not-security-anymore.
“Is DES Cipher Not Security Anymore Essay Example | Topics and Well Written Essays - 250 Words”, n.d. https://studentshare.org/information-technology/1675628-is-des-cipher-not-security-anymore.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Is DES cipher not security anymore

Evaluation of CI analytical software (Cipher and Traction software)

...? Evaluation of CI analytical software (Cipher and Traction software) As B. Lumadue (2008) expressed, competitive intelligence involves gathering data about competitors, analyzing data and using the findings to gain a competitive advantage in the marketplace. Competitive Intelligence software provides templates in order to enter the pure data and transform it to useful and meaningful information. It serves analyzing the current situation and forecasting the future of a business organization. There are many software programs in the market that reflect current technological diversity. Companies that are operating with highly competitive markets such as automotive industry or telecommunications industry would like to use Competitive... ...
10 Pages(2500 words)Research Paper

Social Networking Sites Privacy does not exist anymore

...?Social Networking Sites –Privacy does not exist anymore Social networking sites are a platform through which people can communicate with others in the virtual world of networking. The social networking sites have been gaining popularity since the past decade and now have almost become a part of the daily lives of a large percentage of the population in every country. Students, working professionals, house wives and also aged people are now active on these social sites, communicating with the others, sharing articles, pictures and various other posts, and simply keeping contact with the other people. However, with the expansion of the usage of these sites, the issue related to privacy and confidentiality of private...
4 Pages(1000 words)Essay

Security

...Security The paper delves into the concept of online security which is indeed a very fundamental concern in the present world. In this regard, Google is heavily investing in a series of authentication through the use of two-step verification. There is a greater need to realize a stronger user security and device identification and limit much of the insecurity. The paper identifies some of the common security threats that face people online. However, it is realized that while people are reactive about aspects of online security, they only invest slightly to reduce this risk. This is majorly done through passwords without strong authentication. Some of the...
4 Pages(1000 words)Essay

Computer Literacy: It's not an Option Anymore

...Computer Literacy: It's not an Option Anymore The long list of requirements necessary to successfully complete a college program can make the process of getting a degree a demanding task. Undergraduates have requirements for academics such as math or English. Different majors each have their own unique set of requirements. There are requirements for everything from attendance to correct and complete paperwork. With today's dependence on electronic information, computer literacy should be added to the list of required skills. A student's course work is so integrally dependent on the effective use of computers to access instructions, browse and access library materials, and establish organizational skills that computer...
2 Pages(500 words)Essay

Compagnie Generale des Eaux

...23 September 2007 Case Study for Vivendi: Revitalizing a French Conglomerate The case study highlights the significant events and transformation of the Compagnie Generale des Eaux (CGE) from its beginning in 1853 to its re-creation and change of name to Vivendi in 1998. For the decision makers in the company, the change of name represents its ardent effort to revitalize itself in order to meet the various challenges that the new business environment presents. Guy Dejouany's Corporate Strategy in the 1980's The corporate strategy employed by Guy Dejouany in 1980s can be thought as CGE's response to the various opportunities in the marketplace. Recognizing the economic boom in France and other countries, CGE started...
4 Pages(1000 words)Case Study

Film Triumph des Willens

...Triumph des Willens (1935 An Historical Perspective The German film Triumph des Willens (Triumph of the Will) (1935) filmed by director Leni Riefenstahl, has been one of the most contentiously analyzed films of the past century. The film was produced by Adolph Hitler to document the Sixth National Socialist Party Rally held in September 1934. Though it was created to be a piece of Nazi propaganda, it also serves as a primary source document to analyze the regime's motivations and tactics. Triumph des Willens is a study in Hitler's dictatorial obsession, the goal of the Nazi regime, and illuminates the power of Hitler to employ social engineering on a mass scale. The film is made in the...
4 Pages(1000 words)Movie Review

See des

...682529 Section Marketing Research Go to a Rockies Baseball Game. Include a copy of the promotional item for that game (hat). Do an in-depth interview with four – five (different age groups) people (do not interview yourself or people you are with) who are attending the game. Questions: why they went to the game, their thoughts about the promotion (did they just come for the item), how many sponsor signage they notices during the game, etc. Remember you are dealing with marketing. The interview with the five respondents gave a very strong indication that as far as sporting activities are concerned, much of the motivation that get people to patronize matches has to do with personal thoughts of people about the sporting discipline... Section...
4 Pages(1000 words)Essay

Systems Security IT

.... Likewise, the researchers utilized two hours and one million queries for the attack. Workstation B can utilize brute force attack that will try to retrieve every reachable key in a systematic manner. Likewise, this type of attack is associated with plain text or cipher text type of attacks. Workstation B can attack workstation A by a 4 bit key. Workstation B will allocate a limited length of key along with adequate time for a successful brute force attack. Likewise, encryption algorithms may become vulnerable to brute force attacks as the time passes by because CPU utilization increases. A single DES encryption incorporates an effective length key comprising of 56 bits, as the key can be cracked within...
8 Pages(2000 words)Assignment

Des Pres, Beautiful Life

...the world under a benevolent light. Therefore, if I needed to omit anything from Thoreau’s words in my definition of a beautiful life, I would have excluded the phrase “live according to its [wisdom] dictates”, while including other attributes like “a life of simplicity, independence, magnanimity, and trust” at the same time, with a bit more importance (Thoreau, 1882). Answer 2 Des Pres envisions the human moral senses from the experiences of the concentration camp survivors, where humans were kept under most strict surveillance so far in the modern world. Therefore, the visions about moral senses and humanity framed by Des Pres are worth of modern life style. According to Des Pres,...
1 Pages(250 words)Assignment

Tinker v. Des Moines school District

... when Due: Tinker v. Des Moines school District The Collision with the rights of others is witnessed in the Tinker v. Des Moines school District case where a number of students in the Des Moines decided to wear armbands to support for truce in the Vietnam War. The students decided to wear the armbands during the holiday season .This was agreed upon when the students had a meeting at the home of Christopher Eckhardt. Unfortunately, this decision came to the attention of the management of the Des Moines school where the management decided to suspend any student who wears the armband and refuses to remove it in the school premises. The two students were suspended for the act. This indicated that the school management and the students...
1 Pages(250 words)PowerPoint Presentation
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Essay on topic Is DES cipher not security anymore for FREE!

Contact Us