Preview

Data Encryption Standard

Powerful Essays
Open Document
Open Document
2617 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Data Encryption Standard
Data Encryption Standard
In 1972, the NBS Institute for Computer Sciences and Technology (ICST) initiated a project in computer security, a subject then in its infancy. One of the first goals of the project was to develop a cryptographic algorithm standard that could be used to protect sensitive and valuable data during transmission and in storage. Prior to this NBS initiative, encryption had been largely the concern of military and intelligence organizations. The encryption algorithms, i.e., the formulas or rules used to encipher information, that were being used by national military organizations were closely held secrets. There was little commercial or academic expertise in encryption. One of the criteria for an acceptable encryption algorithm standard was that the security provided by the algorithm must depend only on the secrecy of the key, since all the technical specifications of the algorithm itself would be made public. NBS was the first to embark on developing a standard encryption algorithm that could satisfy a broad range of commercial and unclassified government requirements in information security. Ruth M. Davis, then Director of ICST, asked the National Security Agency (NSA) to help evaluate the security of any cryptographic algorithm that would be proposed as a Federal standard. She then initiated the standard’s development project by publishing an invitation in the Federal Register (May 15, 1973) to submit candidate encryption algorithms to protect sensitive, unclassified data. NBS received many responses demonstrating interest in the project, but did not receive any algorithms that met the established criteria. NBS issued a second solicitation in the Federal Register ( August 17, 1974) and received an algorithm from the IBM Corp., which had developed a family of cryptographic algorithms, primarily for financial applications. After significant review within the government, NBS published the technical specifications of the proposed algorithm in the



Bibliography: [1] Data Encryption Standard, Federal Information Processing Standards Publication (FIPS PUB) 46, National Bureau of Standards, Washington, DC (1977). [2] Data Encryption Algorithm (DEA), ANSI X3.92-1981, American National Standards Institute, New York. [3] Horst Feistel, Cryptography and Computer Privacy, Sci. Am. 228 (5), 15-23 (1973). [4] Horst Feistel, Block Cypher Cryptographic System, US Patent 3,798,359, March 19, 1974. [5] Whitfield Diffie and Martin E. Hellman, Exhaustive Cryptanalysis of the NBS Data Encryption Standard, Computer 10 (6), 74-84 (1977). [6] Electronic Frontier Foundation, Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design, O’Reilly & Associates, Inc., Sebastopol, CA (1998). [7] Data Encryption Standard (DES), Federal Information Processing Standards Publication (FIPS PUB) 46-3, National Institute of Standards and Technology, Gaithersburg, MD (1999). [8] Arjen K. Lenstra and Eric R. Verheul, Selecting Cryptographic Key Sizes (http://www.cryptosavvy.com/) October 1999. [9] Bruce Schneier, Applied Cryptography, Protocols, Algorithms, and Source Code in C, Second edition, John Wiley and Sons, New York (1996) p. 267. 253

You May Also Find These Documents Helpful

  • Better Essays

    It255 Project Part 1

    • 634 Words
    • 3 Pages

    References: David Kim., and Michael G. Solomon. Fundamentals of Information Systems Security , 2012: Sudbury, MA 2012…

    • 634 Words
    • 3 Pages
    Better Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Each plant has an enterprise resource planning server. Its data store centralizes the management each plant’s resource applications (University of Phoenix, 2006). These applications hold vital information of customers, vendors and internal assets which must be secured. Various cryptographic and encryption standards are valuable tools in achieving this goal. Governmental regulatory compliance also asserts demands on data security. The following will evaluate each plant’s data security issues.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Good Essays

    NETWORKING ADMIN

    • 606 Words
    • 3 Pages

    Match common encryption algorithms and methods with the scenarios representing real-world business applications and requirements.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Better Essays

    The beginning of chapter 5 discusses the importance of cryptography and the legislative issues that surround government access. The debate of whether the government should have access to all encryptions we use, ultimately giving them total ability to read all communication to help fight crime and terrorism or if that is a breach of personal space. As the text attests to, "the tension between enabling secure conduct of electronic commerce and preventing secret communication among outlaws had been in the air for a decade" (Abelson, Ledeen, and Lewis 163). Later however, the government turned to helping citizens and businesses encrypt their messages to ultimately keep more information secure through packets from the construction of a system of routers (Abelson, Ledeen, and Lewis 164). However as technology has improved, the ability to create new encryption systems is…

    • 773 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    9/11 and Airport Security

    • 3569 Words
    • 15 Pages

    McClure, George. "IEEE-USA Today 's Engineer." 02.12 Ieee-usa Today 's Engineer. 2007. Web. 21 Feb. 2012. http://www.todaysengineer.org/2005/Jun/security.asp…

    • 3569 Words
    • 15 Pages
    Powerful Essays
  • Better Essays

    Cmgt 400 Week 2

    • 1100 Words
    • 3 Pages

    Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (Exam SY0-301) (3rd ed.). New York, NY: McGraw-Hill Company.…

    • 1100 Words
    • 3 Pages
    Better Essays
  • Better Essays

    Cis 333 Final Term Paper

    • 2531 Words
    • 11 Pages

    Swanson, M., & Guttman, B. (1996). Technology Administration, NIST. Generally Accepted Principles and Practices for Securing Information Technology System, retrieved March 11, 2012, from http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf…

    • 2531 Words
    • 11 Pages
    Better Essays
  • Good Essays

    WFV1 Notes

    • 4474 Words
    • 16 Pages

    Symmetric/ asymertric encryption Network Technology Associate v2.0, Lesson 6: Network and Cloud Security Risks, section "Encryption.”…

    • 4474 Words
    • 16 Pages
    Good Essays
  • Better Essays

    References: Conklin, A., Williams, G., Davis, R., & Cothren, C. (2012). Principles of Computer Security: CompTIA Security+ and Beyond (3rd ed.). New York, NY: McGraw-Hill/Osborne Media.…

    • 1725 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Being a mid-level financial investment and consulting firm, we are governed by laws to protect personal data of our customers. To reduce risks and threats the company needs to develop an IT Security Policy Framework that contains four main components: Policy, Standard, Procedures and Guidelines1. This report focuses on the standard by addressing the three IT infrastructure domains that are affected by the ”Internal Use Only” data classification standard of Richman Investments, where the communication of data does not leave the companies intranet2 and how each of the following IT Infrastructure domains: User, Workstation and LAN are affected by the standard.…

    • 517 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    NSA Spy Agency Analysis

    • 1354 Words
    • 6 Pages

    In its persistent effort to collect and monitor all electronic communications, the NSA leads a campaign to undermine encryption, place backdoors in both hardware and software and amass a stockpile of vulnerabilities and exploits. “For the past decade, N.S.A. has led an aggressive, multipronged effort to break widely used Internet encryption technologies,” as stated in a memo from Government Communications Headquarters, the NSA’s counterpart agency in the UK (Nicole Perlroth). With support from the CIA and FBI, the NSA has also installed spy tools to monitor internet activity in network routers intercepted from US manufacturers like Cisco (Silbert). Furthermore, as a part of its data collection program, the NSA actively influences US and foreign IT industries to modify the design of their commercial products, making it more susceptible to exploitation. Such actions violate privacy rights of consumers, and in turn undermines confidence in the industry. The insertion of backdoors and vulnerabilities in systems are particularly troubling as such actions weakens cybersecurity as a whole, and could potentially backfire on us. The tools implemented by the NSA in its data collection program could one day be exploited by foreign…

    • 1354 Words
    • 6 Pages
    Better Essays
  • Powerful Essays

    The Nsa and Gchq

    • 3038 Words
    • 13 Pages

    If you want to keep information secret, you have two possible strategies: hide the existence of the information, or make the information unintelligible. Cryptography is the art and science of keeping information secure from unintended audiences, of encrypting it. Conversely, cryptanalysis is the art and science of breaking encoded data. The branch of mathematics encompassing both cryptography and cryptanalysis is cryptology. This method of secrecy has existed since 1900 B.C. in the form of Egyptian hieroglyphs. Up to the present two organizations have come to the front of the field; United States ' National Security Agency (NSA) and United Kingdom 's Government Communications Headquarters (GCHQ). In order to understand these institutions in their current state one must know their origins.…

    • 3038 Words
    • 13 Pages
    Powerful Essays
  • Better Essays

    Cmgt400 Week 3

    • 1752 Words
    • 8 Pages

    References: Conklin, A., White, G., Williams, D., Davis, R., & Cothren, C. (2012). Principles of Computer Security: Comp TIA Security + and Beyond (third ed.). Boston, MA: McGraw-Hill Company.…

    • 1752 Words
    • 8 Pages
    Better Essays
  • Better Essays

    3. Conklin, W., & White, G. (2010). Principles of Computer Security (2nd ed.). Chicago, IL: McGraw-Hill.…

    • 1124 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Wireless communication is very common and widely applicable technique in communication field. In these field new techniques invented that is called RFID technique, in which object having RFID tags on them are being accessed in radio frequency region. Cryptography (method involves the both process “encryption” and “decryption”) is widely used in network system’s security. It is also the ancient method of encoding the original messages for transmission. On the other side The RFID technology recently has gained enormous attention in various field like in database maintenances(in the library management system), media, industry and as well as in network security. In the Radio frequency identification (RFID) use of an object (typically referred to as RFID tag) applied to or incorporated into a product, animal, or person (user) for the purpose of identification and tracking using radio waves. Each member has its unique id or RFID tag. However security and privacy pose significant challenges on the system.…

    • 1385 Words
    • 6 Pages
    Powerful Essays

Related Topics