×
1 Choose EITC/EITCA Certificates
2 Learn and take online exams
3 Get your IT skills certified

Confirm your IT skills and competencies under the European IT Certification framework from anywhere in the world fully online.

EITCA Academy

Digital skills attestation standard by the European IT Certification Institute aiming to support Digital Society development

LOG IN TO YOUR ACCOUNT

CREATE AN ACCOUNT FORGOT YOUR PASSWORD?

FORGOT YOUR PASSWORD?

AAH, WAIT, I REMEMBER NOW!

CREATE AN ACCOUNT

ALREADY HAVE AN ACCOUNT?
EUROPEAN INFORMATION TECHNOLOGIES CERTIFICATION ACADEMY - ATTESTING YOUR PROFESSIONAL DIGITAL SKILLS
  • SIGN UP
  • LOGIN
  • INFO

EITCA Academy

EITCA Academy

The European Information Technologies Certification Institute - EITCI ASBL

Certification Provider

EITCI Institute ASBL

Brussels, European Union

Governing European IT Certification (EITC) framework in support of the IT professionalism and Digital Society

  • CERTIFICATES
    • EITCA ACADEMIES
      • EITCA ACADEMIES CATALOGUE<
      • EITCA/CG COMPUTER GRAPHICS
      • EITCA/IS INFORMATION SECURITY
      • EITCA/BI BUSINESS INFORMATION
      • EITCA/KC KEY COMPETENCIES
      • EITCA/EG E-GOVERNMENT
      • EITCA/WD WEB DEVELOPMENT
      • EITCA/AI ARTIFICIAL INTELLIGENCE
    • EITC CERTIFICATES
      • EITC CERTIFICATES CATALOGUE<
      • COMPUTER GRAPHICS CERTIFICATES
      • WEB DESIGN CERTIFICATES
      • 3D DESIGN CERTIFICATES
      • OFFICE IT CERTIFICATES
      • BITCOIN BLOCKCHAIN CERTIFICATE
      • WORDPRESS CERTIFICATE
      • CLOUD PLATFORM CERTIFICATENEW
    • EITC CERTIFICATES
      • INTERNET CERTIFICATES
      • CRYPTOGRAPHY CERTIFICATES
      • BUSINESS IT CERTIFICATES
      • TELEWORK CERTIFICATES
      • PROGRAMMING CERTIFICATES
      • DIGITAL PORTRAIT CERTIFICATE
      • WEB DEVELOPMENT CERTIFICATES
      • DEEP LEARNING CERTIFICATESNEW
    • CERTIFICATES FOR
      • EU PUBLIC ADMINISTRATION
      • TEACHERS AND EDUCATORS
      • IT SECURITY PROFESSIONALS
      • GRAPHICS DESIGNERS & ARTISTS
      • BUSINESSMEN AND MANAGERS
      • BLOCKCHAIN DEVELOPERS
      • WEB DEVELOPERS
      • CLOUD AI EXPERTSNEW
  • FEATURED
  • SUBSIDY
  • HOW IT WORKS
  •   IT ID
  • ABOUT
  • CONTACT
  • MY ORDER
    Your current order is empty.
EITCIINSTITUTE
CERTIFIED

Why is the Data Encryption Standard (DES) considered vulnerable to brute-force attacks, and how does modern computational power affect its security?

by EITCA Academy / Wednesday, 12 June 2024 / Published in Cybersecurity, EITC/IS/CCF Classical Cryptography Fundamentals, Conclusions for private-key cryptography, Multiple encryption and brute-force attacks, Examination review

The Data Encryption Standard (DES) is a symmetric-key algorithm for the encryption of digital data. Initially adopted as a federal standard in the United States in 1977, DES has played a significant role in the history of cryptography. However, DES is now considered vulnerable to brute-force attacks due to several factors, including its relatively short key length and the advancements in computational power.

Key Length and Brute-Force Attacks

DES uses a 56-bit key, which means there are 2^{56} possible keys. While this might seem substantial, it is relatively small compared to modern cryptographic standards. A brute-force attack involves systematically checking all possible keys until the correct one is found. The feasibility of such an attack is directly related to the number of possible keys and the computational power available.

To understand why DES is vulnerable, it is essential to consider the exponential nature of key space. For a 56-bit key, the number of possible keys is:

    \[ 2^{56} = 72,057,594,037,927,936 \]

This is approximately 72 quadrillion keys. In the 1970s, this was an astronomically large number, making brute-force attacks impractical with the technology available at that time. However, as computational power has increased, the time required to perform a brute-force attack on DES has decreased significantly.

Advancements in Computational Power

Moore's Law, which states that the number of transistors on a microchip doubles approximately every two years, has been a guiding principle in the growth of computational power. This exponential growth means that what was once computationally infeasible can become feasible over time. For example, in the 1970s, the fastest computers could perform a few million instructions per second (MIPS). Modern processors, however, can perform billions of instructions per second (GIPS), and specialized hardware like GPUs and FPGAs can perform even more.

To illustrate, consider the Electronic Frontier Foundation's (EFF) DES cracker, built in 1998. This machine, costing about $250,000, was capable of testing 88 billion keys per second. It successfully cracked a DES-encrypted message in less than 56 hours. Given the continued advancements in technology, the cost and time required to perform such an attack have decreased even further.

Impact of Modern Computational Power

Modern computational power has rendered DES essentially obsolete for secure communications. To put this into perspective, today's cloud computing platforms can offer petaflops (quadrillions of floating-point operations per second) of computational power. Distributed computing projects can harness the idle processing power of thousands or even millions of computers worldwide. With such resources, a brute-force attack on DES can be executed in a matter of hours or even minutes.

Consider the following example: if a modern distributed computing project can harness the power of 1 million computers, each capable of testing 1 billion keys per second, the total key testing rate would be:

    \[ 1,000,000 \times 1,000,000,000 = 10^{15} \text{ keys per second} \]

At this rate, the entire key space of DES could be exhausted in:

    \[ \frac{2^{56}}{10^{15}} \approx 72,000 \text{ seconds} \approx 20 \text{ hours} \]

This calculation demonstrates that DES is no longer secure against brute-force attacks given modern computational capabilities.

Multiple Encryption Schemes

In response to the vulnerabilities of DES, cryptographers have explored various multiple encryption schemes to enhance security. One such method is Triple DES (3DES), which applies the DES algorithm three times with either two or three different keys. The effective key length of 3DES can be 112 or 168 bits, making a brute-force attack significantly more challenging.

For instance, with 3DES using three different keys, the key space is:

    \[ 2^{168} \approx 3.74 \times 10^{50} \]

This key space is vastly larger than that of DES, making brute-force attacks impractical with current and foreseeable computational power. However, 3DES is not without its drawbacks. It is computationally intensive and slower than modern algorithms like the Advanced Encryption Standard (AES).

Modern Alternatives

The Advanced Encryption Standard (AES) has largely replaced DES and 3DES in most applications. AES supports key lengths of 128, 192, and 256 bits, providing a significantly larger key space:

– AES-128: 2^{128} \approx 3.4 \times 10^{38}
– AES-192: 2^{192} \approx 6.3 \times 10^{57}
– AES-256: 2^{256} \approx 1.2 \times 10^{77}

Even with the most powerful computational resources available today, a brute-force attack on AES is considered infeasible. For example, a brute-force attack on AES-128 would require testing 2^{128} keys. If a hypothetical supercomputer could test 10^{18} keys per second (exascale computing), it would still take approximately 10^{13} years to exhaust the key space.

Conclusion

The vulnerability of DES to brute-force attacks underscores the importance of key length in cryptographic security. As computational power continues to grow, the need for longer key lengths and more robust encryption algorithms becomes increasingly critical. While DES played a pivotal role in the development of modern cryptography, its susceptibility to brute-force attacks has rendered it obsolete for secure communications in the contemporary digital landscape.

Modern encryption standards like AES, with their significantly larger key spaces, provide the necessary security to protect sensitive information against brute-force attacks. The evolution from DES to AES exemplifies the dynamic nature of cryptographic security, constantly adapting to the advancements in computational power and the ever-present threat of malicious actors.

Other recent questions and answers regarding Conclusions for private-key cryptography:

  • Are brute force attack always an exhausive key search?
  • What are the implications of false positives in brute-force attacks, and how can multiple plaintext-ciphertext pairs help mitigate this issue?
  • How does Triple DES (3DES) improve upon the security of single and double encryption, and what are its practical applications?
  • What is the meet-in-the-middle attack, and how does it reduce the effective security of double encryption?
  • How does double encryption work, and why is it not as secure as initially thought?
  • For the RSA cryptosystem to be considered secure how large should be the initial prime numbers selected for the keys computing algorithm?

More questions and answers:

  • Field: Cybersecurity
  • Programme: EITC/IS/CCF Classical Cryptography Fundamentals (go to the certification programme)
  • Lesson: Conclusions for private-key cryptography (go to related lesson)
  • Topic: Multiple encryption and brute-force attacks (go to related topic)
  • Examination review
Tagged under: AES, Brute-Force Attacks, Computational Power, Cybersecurity, DES, Triple DES
Home » Cybersecurity » EITC/IS/CCF Classical Cryptography Fundamentals » Conclusions for private-key cryptography » Multiple encryption and brute-force attacks » Examination review » » Why is the Data Encryption Standard (DES) considered vulnerable to brute-force attacks, and how does modern computational power affect its security?

Certification Center

USER MENU

  • My Account

CERTIFICATE CATEGORY

  • EITC Certification (105)
  • EITCA Certification (9)

What are you looking for?

  • Introduction
  • How it works?
  • EITCA Academies
  • EITCI DSJC Subsidy
  • Full EITC catalogue
  • Your order
  • Featured
  •   IT ID
  • EITCA reviews (Medium publ.)
  • About
  • Contact

EITCA Academy is a part of the European IT Certification framework

The European IT Certification framework has been established in 2008 as a Europe based and vendor independent standard in widely accessible online certification of digital skills and competencies in many areas of professional digital specializations. The EITC framework is governed by the European IT Certification Institute (EITCI), a non-profit certification authority supporting information society growth and bridging the digital skills gap in the EU.

Eligibility for EITCA Academy 80% EITCI DSJC Subsidy support

80% of EITCA Academy fees subsidized in enrolment by

    EITCA Academy Secretary Office

    European IT Certification Institute ASBL
    Brussels, Belgium, European Union

    EITC / EITCA Certification Framework Operator
    Governing European IT Certification Standard
    Access contact form or call +32 25887351

    Follow EITCI on X
    Visit EITCA Academy on Facebook
    Engage with EITCA Academy on LinkedIn
    Check out EITCI and EITCA videos on YouTube

    Funded by the European Union

    Funded by the European Regional Development Fund (ERDF) and the European Social Fund (ESF) in series of projects since 2007, currently governed by the European IT Certification Institute (EITCI) since 2008

    Information Security Policy | DSRRM and GDPR Policy | Data Protection Policy | Record of Processing Activities | HSE Policy | Anti-Corruption Policy | Modern Slavery Policy

    Automatically translate to your language

    Terms and Conditions | Privacy Policy
    EITCA Academy
    • EITCA Academy on social media
    EITCA Academy


    © 2008-2025  European IT Certification Institute
    Brussels, Belgium, European Union

    TOP
    CHAT WITH SUPPORT
    Do you have any questions?