Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Courses
  • Tutoring
  • Home
  • Business Management & Operations
  • Business Communications & Negotiation

Data Encryption Standard - Explained

What is a Data Encryption Standard?

Written by Jason Gordon

Updated at March 10th, 2022

Contact Us

If you still have questions or prefer to get help directly from an agent, please submit a request.
We’ll get back to you as soon as possible.

Please fill out the contact form below and we will reply as soon as possible.

  • Marketing, Advertising, Sales & PR
    Principles of Marketing Sales Advertising Public Relations SEO, Social Media, Direct Marketing
  • Accounting, Taxation, and Reporting
    Managerial & Financial Accounting & Reporting Business Taxation
  • Professionalism & Career Development
  • Law, Transactions, & Risk Management
    Government, Legal System, Administrative Law, & Constitutional Law Legal Disputes - Civil & Criminal Law Agency Law HR, Employment, Labor, & Discrimination Business Entities, Corporate Governance & Ownership Business Transactions, Antitrust, & Securities Law Real Estate, Personal, & Intellectual Property Commercial Law: Contract, Payments, Security Interests, & Bankruptcy Consumer Protection Insurance & Risk Management Immigration Law Environmental Protection Law Inheritance, Estates, and Trusts
  • Business Management & Operations
    Operations, Project, & Supply Chain Management Strategy, Entrepreneurship, & Innovation Business Ethics & Social Responsibility Global Business, International Law & Relations Business Communications & Negotiation Management, Leadership, & Organizational Behavior
  • Economics, Finance, & Analytics
    Economic Analysis & Monetary Policy Research, Quantitative Analysis, & Decision Science Investments, Trading, and Financial Markets Banking, Lending, and Credit Industry Business Finance, Personal Finance, and Valuation Principles
  • Courses
+ More

Table of Contents

What is a Data Encryption Standard?A Little More on What is Data Encryption StandardsAcademic Research for Data Encryption

What is a Data Encryption Standard?

Data Encryption Standard is an early data encryption method containing the symmetric key algorithm for encrypting electronic data. It is an insecure and outdated method of data encryption which uses the same key to encrypt and decrypt a message. It was developed in the early 1970s and has a great influence on developing modern cryptography.

Back to: BUSINESS COMMUNICATIONS & NEGOTIATION

How are Data Encryption Standards Used?

In 1973, the National Bureau of Standards (now the National Institute of Standard and Technology) issued a notice inviting proposals for a crypto algorithm that can be considered to be the data encryption standard. No viable proposals were received at the first attempt. 

In 1974, National Bureau of Standards issued a second notice inviting the same and International Business Machines Corporation (IBM) came up with Lucifer algorithm. National Bureau of Standards and U.S. National Security Agency reviewed the algorithm and made some modification in consultation with IBM. 

Then it was endorsed as the Data Encryption Standard. In the following years, it became mandatory to use the DES algorithm for all electronic financial transactions of the U.S. government. 

All the nations started using DES as the standards organizations adopted it worldwide and it became the international standard for business and commercial data encryption. 

DES is a block cipher, here a cryptographic key and algorithm are applied to a block of data simultaneously and not one bit at a time. DES groups a text into 64-bit blocks. 

A secret key enciphers each block into 64-bit ciphertext by transposition and substitution. It involves 16 iterations and can run in four different modes. The key controlling the transformation consists of 64 bits, the user can choose only 56 of those. 

These 56 are actually the key bits, the remaining are parity check bits. Decryption is the inversion of the encryption, following the steps in reverse order. In the beginning of 21st century, the DES was replaced by a more secure encryption standard named Advanced Encryption Standards.


data encryption standard

Was this article helpful?

Yes
No

Related Articles

  • Undue Influence - Explained
  • Constituent Relationships in Negotiations - Explained
  • Culturally Responsive Negotiation Strategies - Explained
  • Communications - Writing Business Reports



©2011-2021. The Business Professor, LLC.
  • Privacy

  • Questions

Definition by Author

0
0
Expand