0% found this document useful (0 votes)
38 views5 pages

Data Encryption

Uploaded by

maxivenize
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
38 views5 pages

Data Encryption

Uploaded by

maxivenize
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Cryptographic Techniques Analysis:

Data Encryption Standard vs. Advanced Encryption Standard

1. Research and Analysis

Technique 1: Data Encryption Standard (DES)

Overview and Principles:

− DES is a method of encryption that uses the same key to both encrypt and decrypt

data. It works by dividing the data into 64-bit blocks and then encrypting each block

using a 56-bit key. This process goes through 16 steps, where the data is shuffled and

substituted to enhance security. DES can either encrypt each block separately or link

them so that each block depends on the one before it.

Strengths:

− Widely implemented for securing communications during its prime.

− Simple to implement in hardware and software, with well-understood mechanics.

− Designed to resist a specific type of attack called differential cryptanalysis. It has

features that make it harder for attackers to use this method effectively.

Weaknesses:

− Due to its short key length, it is very vulnerable to brute force attacks, where attackers

try every possible key.

− In 1999, DES was effectively broken by researchers using a modern technology of

distributed computing approach to crack its 56-bit key.

− Considered outdated and obsolete by NIST due to it no longer provides security.


Use Cases:

− Historically, it was used for securing financial transactions, banking systems, and

telecommunications.

− Found in older software and systems that haven’t upgraded to newer encryption

methods, but not recommended for new applications.

− Often studied in school to teach the basics encryption.

Technique 2: Advanced Encryption Standard (AES)

Overview and Principles:

− AES is a symmetric block cipher that encrypts data in 128-bit blocks, utilizing key

lengths of 128, 192, or 256 bits. With its support to longer keys, it provides stronger

protection for highly sensitive information. It was also chosen by the U.S.

government to protect classified information.

Strengths:

− Secure against all known attacks. It becomes the standard for protecting sensitive data

of government and commercials.

− Works well on software and hardware, making it faster for encrypting and decrypting

data than the DES method.

− Supports longer keys, which means it is much more secure than DES in helping to

protect information better.

Weaknesses:
− At risk of side-channel attacks, where attackers monitor the device's physical

activities during encryption to gather clues about the secret key.

− Demanding on resources, which may make it slow on lower-end devices.

Use Cases:

− It encrypts data on storage media, such as hard drives, to ensure that sensitive

information remains secure even if the physical device is not present.

− It encrypts messages and calls to protect user’s privacy and preventing any

unauthorized person to access their communications.

− It ensures safe online browsing and data transfers.

2. Comparison

Security:

DES: Less secure due to its 56-bit key, which can be easily broken with today’s powerful

technology. It is susceptible to brute force attacks, where an attacker attempts every

possible key until the correct one is found.

AES: Provides strong security with longer key options, making it resistant to brute force

attacks. AES is currently considered safe against all known threats.

Performance:

DES: Slower than AES, particularly in applications that need to process a lot of data. Its

64-bit block size also limits its efficiency when handling large data.
AES: Faster and more efficient, especially when used in hardware. Its 128-bit block size

allows it to perform tasks making it suitable for high-performance applications.

Scenarios:

DES: Can still be used in older systems but should not be used in modern applications. It

is mostly relevant to understand how cryptography started and developed as years passed

by.

AES: The go-to option for new applications that need strong encryption. It is suitable for

situations that need both strong security and good performance.

REFERENCE:

Cole, B. (2019, October 22). The difference between AES and DES encryption. Security.

https://www.techtarget.com/searchsecurity/answer/The-difference-between-AES-encryption-

and-DES-encryption

Loshin, P., & Cobb, M. (2024, May 2). What is Data Encryption Standard (DES)? Security.

https://www.techtarget.com/searchsecurity/definition/Data-Encryption-

Standard#:~:text=DES%20uses%20the%20same%20key,Encryption%20Standard%20(AES)%2

0algorithm.

Baum, M. A. (2023, February 6). NIST withdraws outdated Data Encryption Standard. NIST.

https://www.nist.gov/news-events/news/2005/06/nist-withdraws-outdated-data-encryption-

standard
Awati, R., Bernstein, C., & Cobb, M. (2024, February 20). Advanced Encryption Standard

(AES). Security. https://www.techtarget.com/searchsecurity/definition/Advanced-Encryption-

Standard

You might also like