The Records Encryption standard (DES) is a not unusual widespread for inFormation encryption and a shape of mystery key Cryptography (SKC), which uses only one key for encryption and Decryption. Public Key Cryptography (PKC) uses keys, i.E., one for encryption and one for decryption.
In 1972, the National Bureau of Standards (NBS) approached the Institute for Computer Sciences and Technology (ICST) to plan an encryption set of rules to secure stored and transmitted information. The set of rules could be Publicly available, but its key might be pinnacle mystery.
The National Security Agency (NSA) assisted with the cryptographic set of rules assessment techniques, and in 1973, submission invites have been posted within the Federal Register. However, the submissions have been unaccepTable. In 1974, a 2d invitation was posted, which resulted in a submission from IBM. In 1975, technical specs have been posted for remarks inside the Federal Register, and analysis and evaLuation started. In 1977, NBS issued the Algorithm, i.E., DES, as Federal Information Processing Standards (FIPS) forty six.
Shortly thereafter, the U.S. Department of Defense (DoD) implemented DES. Specifications are mentioned in FIPS ebook forty six-three, FIPS 81, ANSI X3.92 and ANSI X3.106. For security motives, the U.S. Authorities has by no means legal exports of this Encryption Software program.
There are as a minimum sEventy two quadrillion DES key opportuNities. In 1993, NIST recertified DES, and the Advanced Encryption Standard (AES) have become its unofficial alternative.
When we refer to DES as an acronym of Data Encryption Standard, we mean that DES is formed by taking the initial letters of each significant word in Data Encryption Standard. This process condenses the original phrase into a shorter, more manageable form while retaining its essential meaning. According to this definition, DES stands for Data Encryption Standard.
If you have a better way to define the term "Data Encryption Standard" or any additional information that could enhance this page, please share your thoughts with us.
We're always looking to improve and update our content. Your insights could help us provide a more accurate and comprehensive understanding of Data Encryption Standard.
Whether it's definition, Functional context or any other relevant details, your contribution would be greatly appreciated.
Thank you for helping us make this page better!
Obviously, if you're interested in more information about Data Encryption Standard, search the above topics in your favorite search engine.
Score: 5 out of 5 (1 voters)
Be the first to comment on the Data Encryption Standard definition article
MobileWhy.comĀ© 2024 All rights reserved