Modern · 1977 Broken (brute force, 1998)

DES (Data Encryption Standard)

The first public, government-standardised cipher — and the cipher that started a generation of academic cryptanalysis.

OriginIBM (Lucifer, 1971), modified by NSA, standardised by NBS as FIPS 46
Year1977
TypeSymmetric block cipher (Feistel network, 64-bit block, 56-bit key)
StatusWithdrawn 2005; replaced by AES; 3DES deprecated 2023
Modern RoleHistorical foundation; 3DES still appears in legacy banking and EMV until 2023 sunset

Why This Matters

DES was the first cipher whose specification was fully public, peer-reviewed, and adopted as a government standard. That openness — controversial at the time — created modern academic cryptanalysis: Biham and Shamir's differential cryptanalysis (1991) and Matsui's linear cryptanalysis (1993) were both invented to attack DES, and both reshaped how every subsequent cipher is designed.

📜Historical Context

IBM's Horst Feistel led the design of Lucifer in the early 1970s. NBS (now NIST) issued an open call for a standard cipher; IBM submitted a hardened Lucifer derivative; NSA modified the S-boxes and reduced the key from 112 bits to 56 bits. Cryptographers cried foul over the key-length cut and the unexplained S-box changes — until 1991, when Biham and Shamir showed the NSA's S-boxes were specifically hardened against differential cryptanalysis, a technique IBM and NSA both knew about and the public did not.

⚙️How It Works

DES is a 16-round Feistel network. The 64-bit plaintext is split into two 32-bit halves L and R. Each round computes Li+1 = Ri and Ri+1 = Li ⊕ F(Ri, Ki). The round function F expands R to 48 bits, XORs the round subkey, passes the result through eight 6-to-4-bit S-boxes (the heart of DES's non-linearity), and applies a final permutation. Sixteen rounds of this with sixteen subkeys derived from the 56-bit master key produce ciphertext that survives all linear and differential attacks within its key budget — but not exhaustive search.

🛡️Security & Cryptanalysis

In 1998 the EFF's $250,000 Deep Crack machine recovered a DES key in 56 hours by brute force. By 2008 a single FPGA cluster could do it in under a day. Differential and linear cryptanalysis require ~247 chosen plaintexts — impractical operationally, but a clear theoretical break. Triple-DES (3DES) extended the effective key to 112 bits and bought DES another two decades, but by 2023 NIST formally retired 3DES because of the small 64-bit block size (the Sweet32 birthday attack) and modern computing capacity.

🌐Where You Use It Today
WhereHow DES is Used
Banking (1980s–2010s)ATM PIN encryption, EMV chip cards (3DES); legacy systems still in slow migration
Unix passwd (until 1990s)crypt(3) used DES iterated 25 times to hash passwords
Kerberos v4DES was the original Kerberos cipher; v5 added AES support
Cryptanalysis educationEvery academic cryptography course still teaches DES because Feistel, S-boxes, and the avalanche effect are easiest to demonstrate on it
Quick Facts
EraModern · 1977
StatusWithdrawn 2005; replaced by AES; 3DES deprecated 2023
OriginIBM (Lucifer, 1971), modified by NSA, standardised by NBS as FIPS 46
Year1977
TypeSymmetric block cipher (Feistel network, 64-bit block, 56-bit key)
Modern RoleHistorical foundation; 3DES still appears in legacy banking and EMV until 2023 sunset
← Previous Hall X · Codebreakers