Glossary / D / Data Encryption Standard

Data Encryption Standard

The Data Encryption Standard (DES) is a symmetric-key algorithm developed in the 1970s to encrypt electronic data. It uses a 56-bit key to process data in 64-bit blocks and converts readable data into ciphertext that can only be decrypted using the same key.

DES was one of the early methods used to protect data in transit in file transfer protocols (FTP). While its structure and use of a single private key made implementation straightforward, its security has become outdated due to advances in computer processing power and cryptanalysis techniques that can crack its encryption keys via brute force in a matter of hours.

DES is now considered deprecated for most secure applications and has largely been replaced by more robust algorithms like Triple DES and the Advanced Encryption Standard (AES). Despite its age, some systems maintain DES compatibility for legacy integrations where newer methods are not yet supported.

DES features

DES was designed to provide fast, hardware-friendly encryption for sensitive data. While no longer recommended for modern security needs, it introduced several core features that influenced later encryption standards used in managed file transfer (MFT) and FTP systems by bringing industry attention to block encryption ciphers.

Key DES features include:

  • Designed for efficient implementation in hardware systems
  • Implements permutation and substitution operations
  • Operates on 64-bit data blocks
  • Symmetric-key encryption using a 56-bit key
  • Utilizes 16 rounds of Feistel-based processing

These features made DES suitable for early file transfer encryption needs that were based on limited computing resources.

Why is DES no longer used?

DES was widely used to encrypt data. Because of the hardware limitations of the time, it used a smaller block size. That size now makes it weak against modern technology. New cryptanalysis methods can break DES by brute force in a few hours. Because of this, DES is no longer trusted to protect sensitive information. It has been taken out of most secure transfer protocols. It is also no longer accepted in approved systems, including those used by the U.S. government.

The history and legacy of DES

DES was created in the early 1970s as a consistent way to encrypt data in both government and business systems. The National Bureau of Standards adopted it and published it as one of the first Federal Information Processing Standards (FIPS) in 1977.

The way DES was built and used influenced future encryption methods. It also shaped how modern data security works in FTP systems, as it was the first block cipher of its kind. Though deprecated, DES remains a foundational part of cryptographic history.

How DES works

DES uses symmetric-key encryption. One key is used to encrypt and decrypt the data. It processes the data in blocks of 64 bits. Each block goes through several stages to become ciphertext. The algorithm uses a Feistel function to do this. The function splits the block in half and applies substitutions and shifts.

The core steps of DES are:

  • Initial permutation of the 64-bit plaintext
  • Splitting the data into two 32-bit halves
  • 16 rounds of processing using subkeys derived from the main 56-bit key
  • Substitution via S-boxes and permutation for diffusion
  • Final permutation to produce the ciphertext

These steps make the output dependent on both the key and the input, which helps resist basic cryptanalysis but is no longer sufficient for modern threats.

Data Encryption Standard FAQs

What are DES and AES?

DES is an older method that scrambles data using a 56-bit key. It breaks the data into chunks of 64 bits. This method is now outdated and not safe for secure use. AES replaced DES and is now the most trusted option. It can use keys that are 128, 192 or 256 bits long. It works by encrypting data in 128-bit blocks.

What are the standards of encryption?

Encryption standards define how algorithms will operate to transform data into an unreadable state and later restore it using the proper key. There are two main types of encryption. Symmetric-key encryption uses one shared key for both encoding and decoding. Examples include DES, 3DES and AES. These methods work well for fast, bulk data processing. Asymmetric encryption uses two separate keys. One is public and the other is private. RSA and ECC are common examples. These systems are often used to secure smaller data or to exchange symmetric keys.
The AES is the official U.S. federal data encryption standard today and is trusted by many industries to secure transferred data.

What is the NIST Data Encryption Standard?

The Data Encryption Standard came out in 1977. NIST approved it that year for use across federal systems. It used a symmetric-key method. The standard helped protect sensitive data that was not classified. It was known as FIPS Publication 46.

DES processes information in 64-bit blocks using a 56-bit key to handle encryption. While it served as the standard option for encryption in government and business setups into the 1990s, over time, improvements in computing led NIST to phase out DES in favor of the AES. This newer method provides better security and allows the use of larger encryption keys.

What is the 256 encryption standard?

The 256 encryption standard means it uses a key that’s 256 bits long. Most of the time, this refers to an encryption method called AES-256. That method splits up the data into 128-bit pieces. Each piece gets scrambled with the key. You’ll see AES-256 used in banks and by the government. Large organizations use it too. It’s commonly implemented in organizations that prioritize strong data protection.

Use encryption that meets the mark

Learn what it takes to encrypt your files the right way.
Blog

Six common questions about encrypted file transfer

Blog

What is the difference between FIPS 140-2 and 140-3?

Blog

What is FIPS compliance? How does it affect secure file transfer?

Blog

Your guide to solving file transfer data compliance challenges

Start a 25-day free trial

Try Cerberus Enterprise Edition for free

  • 25-Day Free Trial
  • Installs in minutes
  • No credit card required